메뉴 건너뛰기




Volumn 6, Issue 4, 2011, Pages 930-938

Securing peer-to-peer mobile communications using public key cryptography: New security strategy

Author keywords

Authentication; Confidentiality; Integrity and nonrepudiation; Mobile communication security; NTRU; Peer to peer; Public key cryptography

Indexed keywords


EID: 79957478695     PISSN: 19921950     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (36)

References (38)
  • 2
    • 74349117323 scopus 로고    scopus 로고
    • A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
    • Ahmed MA, Kiah MLM, Zaidan BB, Zaidan AA (2010). "A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. " J. Appl. Sci., 10(1): 59-64.
    • (2010) J. Appl. Sci. , vol.10 , Issue.1 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 3
    • 78951479954 scopus 로고    scopus 로고
    • Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
    • Alam GM, Kiah MLM, Zaidan BB, Zaidan AA, Alanazi HO (2010) "Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. " Sci. Res. Essays, 5(21): 3254-3260.
    • (2010) Sci. Res. Essays , vol.5 , Issue.21 , pp. 3254-3260
    • Alam, G.M.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4    Alanazi, H.O.5
  • 4
    • 78049468900 scopus 로고    scopus 로고
    • Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance
    • Alanazi HO, Jalab HA, Alam GM, Zaidan BB, Zaidan AA, (2010a). "Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance. " J. Med. Plants Res., 4(19): 2059-2074.
    • (2010) J. Med. Plants Res. , vol.4 , Issue.19 , pp. 2059-2074
    • Alanazi, H.O.1    Jalab, H.A.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 6
    • 43449099742 scopus 로고    scopus 로고
    • Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
    • Barkan E, Biham E, Keller N (2008). Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptol., 21(3): 392-429.
    • (2008) J. Cryptol. , vol.21 , Issue.3 , pp. 392-429
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 8
    • 66649118184 scopus 로고    scopus 로고
    • Performance Analysis of Public key Cryptographic Systems RSA and NTRU
    • Challa N, Pradhan J (2007). Performance Analysis of Public key Cryptographic Systems RSA and NTRU. IJCSNS Int. J. Comput. Sci. Netw. Security, 7: 87-96.
    • (2007) IJCSNS Int. J. Comput. Sci. Netw. Security , vol.7 , pp. 87-96
    • Challa, N.1    Pradhan, J.2
  • 9
    • 34548129922 scopus 로고    scopus 로고
    • ID-based digital signature scheme on the elliptic curve cryptosystem
    • Chung, YF, Huang KH, Lai F, Chen TS (2007). ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Standards Interfaces, 29(6): 601-604.
    • (2007) Comput. Standards Interfaces , vol.29 , Issue.6 , pp. 601-604
    • Chung, Y.F.1    Huang, K.H.2    Lai, F.3    Chen, T.S.4
  • 10
    • 78650601424 scopus 로고    scopus 로고
    • GSM World, Retrieved 2-9-2009, from
    • GSM World (2009a). GSM Security Algorithms. Retrieved 2-9-2009, from http://www.gsmworld.com/our-work/programmesandinitiatives/fraud-and-security/gsm_security_algorithms.htm.
    • (2009) GSM Security Algorithms
  • 11
    • 78650624481 scopus 로고    scopus 로고
    • GSM World, Retrieved 2-9-2009, from
    • GSM World (2009b). Market Data Summary (Q2 2009). Retrieved 2-9-2009, from http://www.gsmworld.com/newsroom/marketdata/market_data_summary.htm.
    • (2009) Market Data Summary (Q2 2009)
  • 13
    • 55849109155 scopus 로고    scopus 로고
    • Java based Public Key Infrastructure for SMS Messaging
    • ICTTA'06
    • Hassinen M (2006). Java based Public Key Infrastructure for SMS Messaging. Inf. Commun. Technol., ICTTA'06. 2(1).
    • (2006) Inf. Commun. Technol. , vol.2 , Issue.1
    • Hassinen, M.1
  • 15
    • 77958064851 scopus 로고    scopus 로고
    • On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
    • Hmood AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010b). "On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. " Int. J. Phys. Sci., 5(7): 1054-1062.
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.7 , pp. 1054-1062
    • Hmood, A.K.1    Jalab, H.A.2    Kasirun, Z.M.3    Zaidan, A.A.4    Zaidan, B.B.5
  • 20
    • 79957526790 scopus 로고    scopus 로고
    • Nokia, from, http://www.forum.n okia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=%5b N70, N93i, N73,5800_XpressMusic%5d
    • Nokia (2009). Device comparison from http://www.forum.nokia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=[N70, N93i, N73,5800_XpressMusic]http://www.forum.nokia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=%5b N70, N93i, N73,5800_XpressMusic%5d.
    • (2009) Device comparison
  • 21
    • 79957524985 scopus 로고    scopus 로고
    • 2009 18-02-2009 [cited 2009 10-06-2009]; Available from
    • NTRUCryptosystems. About us. 2009 18-02-2009 [cited 2009 10-06-2009]; Available from: http://www.ntru.com/about/pr_20090218.htm.
    • NTRUCryptosystems. About us
  • 22
    • 84857780686 scopus 로고    scopus 로고
    • Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
    • Raad M, Yeasin NM, Alam GM, Zaidan BB, Zaidan AA (2010). "Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. " Afr. J. Bus. Manage., 4(11): 2362-2367.
    • (2010) Afr. J. Bus. Manage. , vol.4 , Issue.11 , pp. 2362-2367
    • Raad, M.1    Yeasin, N.M.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 24
    • 72449121372 scopus 로고    scopus 로고
    • Research on NTRU Algorithm for Mobile Java Security Scalable Computing and Communications
    • SCALCOMEMBEDDEDCOM' 09. IEEE Comput. Soc
    • Shen X, Du Z, Chen R (2009). "Research on NTRU Algorithm for Mobile Java Security Scalable Computing and Communications. " Eighth International Conference on Embedded Computing. SCALCOMEMBEDDEDCOM' 09. IEEE Comput. Soc., pp. 366-369.
    • (2009) Eighth International Conference on Embedded Computing , pp. 366-369
    • Shen, X.1    Du, Z.2    Chen, R.3
  • 25
    • 84876087597 scopus 로고    scopus 로고
    • Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)
    • Sriram VSS, Dinesh S, Sahoo G (2010). Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES). Int. J. Comput. Appl., 1(11): 65-69.
    • (2010) Int. J. Comput. Appl. , vol.1 , Issue.11 , pp. 65-69
    • Sriram, V.S.S.1    Dinesh, S.2    Sahoo, G.3
  • 27
    • 77950341916 scopus 로고    scopus 로고
    • Improving e-payment security using Elliptic Curve Cryptosystem
    • Vincent OR, Folorunso O, Akinde AD (2010). Improving e-payment security using Elliptic Curve Cryptosystem. Electron. Commerce Res., 10(1): 27-41.
    • (2010) Electron. Commerce Res. , vol.10 , Issue.1 , pp. 27-41
    • Vincent, O.R.1    Folorunso, O.2    Akinde, A.D.3
  • 28
    • 74049155937 scopus 로고    scopus 로고
    • A High Security Framework for SMS
    • Paper presented at the, 2009. BMEI '09. 2nd Int. Conf
    • Wu S, Tan C (2009). A High Security Framework for SMS. Paper presented at the Biomedical Engineering and Informatics, 2009. BMEI '09. 2nd Int. Conf., pp. 1-6.
    • (2009) Biomedical Engineering and Informatics , pp. 1-6
    • Wu, S.1    Tan, C.2
  • 30
    • 33646781971 scopus 로고    scopus 로고
    • Study on NTRU decryption failures
    • Yu W, He D, Zhu S., (2005). Study on NTRU decryption failures. Inf. Technol. Appl., (2): 454-459.
    • (2005) Inf. Technol. Appl. , Issue.2 , pp. 454-459
    • Yu, W.1    He, D.2    Zhu, S.3
  • 31
    • 77957325769 scopus 로고    scopus 로고
    • Novel approach for high (secure and rate) data hidden within triplex space for executable file
    • Zaidan AA, Zaidan BB, Alanazi HO, Gani A, Zakaria O, Alam GM (2010a), "Novel approach for high (secure and rate) data hidden within triplex space for executable file. " Sci. Res. Essays, 5(15): 1965-1977.
    • (2010) Sci. Res. Essays , vol.5 , Issue.15 , pp. 1965-1977
    • Zaidan, A.A.1    Zaidan, B.B.2    Alanazi, H.O.3    Gani, A.4    Zakaria, O.5    Alam, G.M.6
  • 32
    • 78649273195 scopus 로고    scopus 로고
    • Novel Multi-Cover Steganography Using Remote Sensing Image and General Recursion Neural Cryptosystem
    • Zaidan AA, Zaidan BB, Taqa AY, Mustafa KMS, Alam GM, Jalab HA (2010b). "Novel Multi-Cover Steganography Using Remote Sensing Image and General Recursion Neural Cryptosystem. " Int. J. Phys. Sci., 5(21): 3254-3260.
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.21 , pp. 3254-3260
    • Zaidan, A.A.1    Zaidan, B.B.2    Taqa, A.Y.3    Mustafa, K.M.S.4    Alam, G.M.5    Jalab, H.A.6
  • 33
    • 78649299082 scopus 로고    scopus 로고
    • StegoMos: A Secure Novel Approach of High Rate Data Hidden Using Mosaic Image and ANN-BMP Cryptosystem
    • Zaidan BB, Zaidan AA, Taqa A, Alam GM, Kiah MLM, Jalab HA (2010c). "StegoMos: A Secure Novel Approach of High Rate Data Hidden Using Mosaic Image and ANN-BMP Cryptosystem. " Int. J. Phys. Sci., 5(11): 1796-1806.
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.11 , pp. 1796-1806
    • Zaidan, B.B.1    Zaidan, A.A.2    Taqa, A.3    Alam, G.M.4    Kiah, M.L.M.5    Jalab, H.A.6
  • 34
    • 78651075908 scopus 로고    scopus 로고
    • A New Hybrid Module for Skin Detector Using Fuzzy Inference System Structure and Explicit Rules
    • Zaidan AA, Karim H, Ahmed NN, Alam GM, Zaidan BB (2010d). A New Hybrid Module for Skin Detector Using Fuzzy Inference System Structure and Explicit Rules. Int. J. Phys. Sci., 5(13): 2084-2097.
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.13 , pp. 2084-2097
    • Zaidan, A.A.1    Karim, H.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5
  • 35
    • 78649415172 scopus 로고    scopus 로고
    • Increase Reliability for Skin Detector Using Backprobgation Neural Network and Heuristic Rules Based on YCbCr
    • Zaidan AA, Ahmed NN, Karim, H. Abdul, Alam GM, Zaidan BB (2010e). Increase Reliability for Skin Detector Using Backprobgation Neural Network and Heuristic Rules Based on YCbCr. Sci. Res. Essays, 5(19): 2931-2946.
    • (2010) Sci. Res. Essays , vol.5 , Issue.19 , pp. 2931-2946
    • Zaidan, A.A.1    Ahmed, N.N.2    Karim, H.A.3    Alam, G.M.4    Zaidan, B.B.5
  • 36
    • 78751500455 scopus 로고    scopus 로고
    • A Novel Hybrid Module of Skin Detector Using Grouping Histogram Technique for Bayesian Method and Segment Skin Adjacent-Nested Technique for Neural Network
    • (In press)
    • Zaidan AA, Karim H, Ahmed NN, Alam GM, Zaidan BB (2010f). A Novel Hybrid Module of Skin Detector Using Grouping Histogram Technique for Bayesian Method and Segment Skin Adjacent-Nested Technique for Neural Network. Int. J. Phys. Sci., 5(14) (In press).
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.14
    • Zaidan, A.A.1    Karim, H.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5
  • 37
    • 78751509177 scopus 로고    scopus 로고
    • Spam Influence on the Business and Economy: Theoretical and Experimental Study for Textual Anti-spam Filtering Using Mature Document Processing and Naïve Bayesian Classifier
    • Zaidan AA, Ahmed NN, Karim H, Alam GM, Zaidan BB (2010g). "Spam Influence on the Business and Economy: Theoretical and Experimental Study for Textual Anti-spam Filtering Using Mature Document Processing and Naïve Bayesian Classifier. " Afr. J. Bus. Manage., 5.
    • (2010) Afr. J. Bus. Manage. , pp. 5
    • Zaidan, A.A.1    Ahmed, N.N.2    Karim, H.3    Alam, G.M.4    Zaidan, B.B.5
  • 38
    • 51249092200 scopus 로고    scopus 로고
    • Building Secure User-to-user Messaging in Mobile Telecommunication Networks
    • WTS 2008
    • Zhao S, Aggarwal A, Liu S (2008). Building Secure User-to-user Messaging in Mobile Telecommunication Networks. WirelessTelecommun. Symp., WTS 2008: 151-157.
    • (2008) WirelessTelecommun. Symp. , pp. 151-157
    • Zhao, S.1    Aggarwal, A.2    Liu, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.