2021
DOI: 10.1109/access.2021.3069627
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices

Abstract: With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices' security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented wor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Security and privacy-related aspects T [202] Advance asymmetric encryption-based protocols [203,204] The use of lightweight crypto-primitives to reduce the CPU load [205] Integration of device/primitive-specific accelerators [206] Identification new thresholds to fulfill application-specific security/privacy demands Subjective interpretations may be hard to quantify or measure S [207] Loneliness as a complex and multidimensional problem [207] Understanding loneliness from a social-psychology perspective [208] Combating loneliness with nostalgia Dealing with cognitive impairments at older age G [209] Creating supportive conditions which reduce the demand for controlled processing; training recollection, etc. [210] aerobic exercise and dietary approaches Ambiguous and heterogeneous intervention studies with elderly G [180] Combined community-based and individual approach for interventions [178] Theory-based approaches for social relationships and skill-building interventions…”
Section: Spatial and Other Non-technology-based Solutionsmentioning
confidence: 99%
“…Security and privacy-related aspects T [202] Advance asymmetric encryption-based protocols [203,204] The use of lightweight crypto-primitives to reduce the CPU load [205] Integration of device/primitive-specific accelerators [206] Identification new thresholds to fulfill application-specific security/privacy demands Subjective interpretations may be hard to quantify or measure S [207] Loneliness as a complex and multidimensional problem [207] Understanding loneliness from a social-psychology perspective [208] Combating loneliness with nostalgia Dealing with cognitive impairments at older age G [209] Creating supportive conditions which reduce the demand for controlled processing; training recollection, etc. [210] aerobic exercise and dietary approaches Ambiguous and heterogeneous intervention studies with elderly G [180] Combined community-based and individual approach for interventions [178] Theory-based approaches for social relationships and skill-building interventions…”
Section: Spatial and Other Non-technology-based Solutionsmentioning
confidence: 99%