2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013
DOI: 10.1109/imis.2013.121
|View full text |Cite
|
Sign up to set email alerts
|

Text Compression and Encryption through Smart Devices for Mobile Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…In traditional secret handshake schemes, even if a casual observer does not have the appropriate credentials, the distributed ciphertext is easily recognizable. Examples of other related work include encryption on portable devices [1,16].…”
Section: Othersmentioning
confidence: 99%
See 1 more Smart Citation
“…In traditional secret handshake schemes, even if a casual observer does not have the appropriate credentials, the distributed ciphertext is easily recognizable. Examples of other related work include encryption on portable devices [1,16].…”
Section: Othersmentioning
confidence: 99%
“…For example, it can be seen in Table 1 that QR code version 5 with an error correction level of Q has a total of 4 error correction blocks. The (c, d, e) values for the first 2 blocks are (33, 15,9) while the values for the next 2 blocks are (34, 16,9).…”
Section: Encoding and Error Correctionmentioning
confidence: 99%
“…The relevant factors in this relationship between security and energy use have been explored in a number of recent studies. For example, an application called "Smart Text Compression and Encryption for Short Message Service (STCESMS)", which was based on the Android operating system, was presented by Pizzolante et al [36]; the application was designed to compress and/or encrypt data for transmission via (Short Message Service) SMS while utilizing, as appropriate, a number of strategies influenced by delivery cost or energy consumption objectives. In another study from the same year, Castiglione et al [37] sought to provide a sturdy and reliable data transfer service that would also minimize the overall battery consumption of heterogeneous mobile terminals; to that end, they presented the architecture of a framework that could enable secure and reliable end-to-end data transfers between such devices, while also describing and modeling the power demands of said framework.…”
Section: Related Workmentioning
confidence: 99%
“…In some application fields, it is difficult to maintain the network connection between the reader and the background. In addition, the consistent network connection should take the energy efficiency into account [8][9][10]. On the other hand, in the offline mode, the stable connection between the reader and the background is unnecessary; the reader can collect tag information and generate multiple grouping-proofs without the participation of the verifier.…”
Section: Introductionmentioning
confidence: 99%