A Novel Tree Based Security Approach for Smart Phones

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-6                           
Year of Publication : 2012
Authors : R.Surendiran , Dr.K.Alagarsamy.
DOI :  10.14445/22312803/IJCTT-V3I6P108

MLA

R.Surendiran , Dr.K.Alagarsamy."A Novel Tree Based Security Approach for Smart Phones"International Journal of Computer Trends and Technology (IJCTT),V3(6):787-792 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Mobile phones play a major role in every human being. Last one decade mobile phones and related devices usage has developed in tremendous manner. Smart devices and its applications used in many ways like financial, entertainment, communication, etc. It also increases the lot of security threats and vulnerabilities. This paper we are going to provide a novel tree based security approach for mobile phones. Tree is data structure concept which is used to make the security level much more complicated.

References-

[1] A Novel Scheme of Data Hiding in Binary Images IEEE, International Conference on Computational Intelligence and Multimedia Applications 2007
[2] Elliptic Curve Cryptography, an Implementation Guide,Anoop MS.
[3] Data Hiding in Binary Image for Authentication and Annotation Min Wu, Member, IEEE, and Bede Liu, Fellow,IEEE
[4] Williams Stallings, Cryptography and Network Security,Prentice Hall, 4th Edition, 2006.
[5] Steganography in MMS, Mohammad Shirali-Shahreza, Sharif University of Technology, Tehran, IRAN.
[6]http://en.wikipedia.org/wiki/Short_Message_Service
[7] Short Message Service Security, February 2008 , The Government of the Hong Kong Special Administrative Region
[8] Huang, D.-L., P.-L. P. Rau and G. Salvendy (2008). Perception of Information Security. Behavior and Information Technology
[9] Image Based Steganography Using LSB Insertion Technique,M. S. Sutaone. IEEE.
[10] Implementation of Text based Cryptosystem using Elliptic Curve Cryptography s. Maria Celestin Vigila , K.Muneeswaran

KeywordsTree, Smart phones, Encryption, Decryption.