Open Access Open Access  Restricted Access Subscription Access

Securing Message at End-to-End Mobile Communication Using Cryptography Algorithm


Affiliations
1 Department of ECM, Koneru Lakshmaiah University, Vaddeswaram Village, Tadepali Mandal, Guntur District - 522502, Andhra Pradesh, India
 

Background/Objectives: State the objectives of your work clearly. Methods/Statistical Analysis: State the methodology you employed to meet the objectives. Findings: Rewrite your findings. Application/Improvements: Here we are using mobile users and authentication server. Authentication server is uploaded with SQL server which help to store the user ID and password of the mobile users.

Keywords

Authentication Server, Cryptography, Decryption, Encryption, End-to-End Communication, Security.
User

Abstract Views: 144

PDF Views: 0




  • Securing Message at End-to-End Mobile Communication Using Cryptography Algorithm

Abstract Views: 144  |  PDF Views: 0

Authors

K. Jaya Rohit
Department of ECM, Koneru Lakshmaiah University, Vaddeswaram Village, Tadepali Mandal, Guntur District - 522502, Andhra Pradesh, India
M. Siva Rama Krishna
Department of ECM, Koneru Lakshmaiah University, Vaddeswaram Village, Tadepali Mandal, Guntur District - 522502, Andhra Pradesh, India
C. H. Geetha Krishna
Department of ECM, Koneru Lakshmaiah University, Vaddeswaram Village, Tadepali Mandal, Guntur District - 522502, Andhra Pradesh, India
P. S. G. Aruna Sri
Department of ECM, Koneru Lakshmaiah University, Vaddeswaram Village, Tadepali Mandal, Guntur District - 522502, Andhra Pradesh, India

Abstract


Background/Objectives: State the objectives of your work clearly. Methods/Statistical Analysis: State the methodology you employed to meet the objectives. Findings: Rewrite your findings. Application/Improvements: Here we are using mobile users and authentication server. Authentication server is uploaded with SQL server which help to store the user ID and password of the mobile users.

Keywords


Authentication Server, Cryptography, Decryption, Encryption, End-to-End Communication, Security.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i30%2F129653