2012
DOI: 10.5121/ijcseit.2012.2109
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Remote Access and Protection of Smartphones Using Short Message Service

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Kuppusamy et al proposed a system that checks the incoming telephone number of the received SMS against trusted numbers. This is a failback mechanism when the message is not secured through the authentication method proposed by Park et al .…”
Section: Reviews Of Remote Wiping and Secure Flash Storage Deletionmentioning
confidence: 99%
“…Kuppusamy et al proposed a system that checks the incoming telephone number of the received SMS against trusted numbers. This is a failback mechanism when the message is not secured through the authentication method proposed by Park et al .…”
Section: Reviews Of Remote Wiping and Secure Flash Storage Deletionmentioning
confidence: 99%
“…[394146] In 2005, the Food and Drug Administration issued a notice entitled “Cyber-security for Networked Medical Devices is a Shared Responsibility”. [47] Nevertheless, new regulations related to secure authentication for mobile devices,[48] options to track and secure mobile devices remotely by locking or wiping out information,[49] or for the use of clinical software on personal mobile devices are still needed. New policies (e.g., use of secure text messages and secure e-mail communication) and technologies (e.g., cloud computing that can allow physicians to send and receive encrypted messages on mobile devices) are currently being developed to overcome some of these security issues.…”
Section: Mobile Devicesmentioning
confidence: 99%
“…And to monitor Android devices using third-party applications required at least internet connection. Various studies have been done before to deal with such weaknesses as research conducted by Kumar and Qadeer [2], Zhang, Hui, Qizhen, and Kim Tai-hoon [3], Kuppusamy and Aghila [4], Rohitaksha, Madhu, Nalini, and Nirupama [5], Punjabi, Pooja, Mantur, and Sneha [6], Gupta and Reddy [7], Dave and Welekar [8], Chandran [9], using Short Message Service (SMS) service to control distance Much as did Rayarikar, Sanket, and Pimpale [10], and Jongseok and Kim Howon [11]. However, in the research done by Kumar and Qadeer [2] and Zhang, Hui, Qizhen, and Kim Tai-hoon [3] the message used to perform the remote has not been using encryption so it must include the password and the keyword plain text.…”
Section: Introductionmentioning
confidence: 99%
“…However, in the research done by Kumar and Qadeer [2] and Zhang, Hui, Qizhen, and Kim Tai-hoon [3] the message used to perform the remote has not been using encryption so it must include the password and the keyword plain text. Then in the research Kuppusamy and Aghila [4] have been using the process of encryption and decryption in the system, but not using the server so that the response that can be accepted by the user only in the form of text-based information.…”
Section: Introductionmentioning
confidence: 99%