A Comprehensive Model Driven ‘Secure Mobile Application for KFU Email System’ (SMAKE)
Subject Areas : Journal of Computer & RoboticsAyat Bu-Suhail 1 , Al-Jwharah Al-Hulaibi 2 , Zainab Al-Khalaf 3 , Noor A. Jebril 4 , Qasem Abu Al-Haija 5
1 - Computer Science Department, 2 Electrical Engineering Department, King Faisal University, Al-Hasa 31982, Saudi Arabia
2 - Computer Science Department, 2 Electrical Engineering Department, King Faisal University, Al-Hasa 31982, Saudi Arabia
3 - Computer Science Department, 2 Electrical Engineering Department, King Faisal University, Al-Hasa 31982, Saudi Arabia
4 - Computer Science Department, 2 Electrical Engineering Department, King Faisal University, Al-Hasa 31982, Saudi Arabia
5 - Tennessee State University, Computer and Information Systems Engineering Department, Nashville, TN, USA
Keywords:
Abstract :
[1] Singh, G, "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security." International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38 (2013).
[2] Jain, R., et.al, "AES Algorithm Using 512 Bit Key Implementation for Secure Communication." International Journal of Advanced Research in Computer Science, vol. 1, no. 3 (2014).
[3] Sharma, N.; Yadav, S.; Bohra, B., "A Review on Data Encryption Techniques Used for Social Media on Internet." Advanced Computational Engineering and Networking, vol. 4, no. 9, pp. 64-68 (2016).
[4] A. Mishra, S. Sharma, "Design and Implementation of High-Speed AES Algorithm for Data Security. " International Journal of Engineering Sciences & Research Technology.doi:10.5281/zenodo.5964. vol. 5, no. 8, pp. 325-337 (2016).
[5] Abu Al-Haija, Q.; et. al, "A tiny RSA cryptosystem based on Arduino microcontroller useful for small scale networks." Procedia Computer Science, Elsevier, doi.org/10.1016/j.procs.2014.07.091. vol. 34, pp.639-646 (2014).
[6] Al-Qadeeb, H.; Abu Al-Haija, Q.; Jebril, N. A., "Software Simulation of Variable Size Message Encryption Based RSA Crypto-Algorithm Using Ms. C#. NET". International Journal of Cyber-Security and Digital Forensics (IJCSDF), DOI:http://dx.doi.org/10.17781/P002241. Vol. 6, no. 1, (2017).
[7] Sheikh, A.; et. al, "Smartphone: Android vs. IOS." The SIJTransactions on Computer Science Engineering & its Applications (CSEA), vol. 1, no. 1, (2013).
[8] Narkhede, S., "Kisan Monitoring System Focused on Android based Application." International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 2, pp. 965-968 (2016).
[9] Spencer, L., (2017, February 8). The 10 Best (Free) Email Service Providers for Your Business. Retrieved from
https://business.tutsplus.com/articles/best-free-email-serviceproviders-- cms-28160
[10] Spencer, L., (2017, February 23). Gmail vs. Outlook: What’s the Best (Free) Email Service? Retrieved from
https://business.tutsplus.com/articles/gmail-vs-outlook-whats-thebest- free-email-service--cms-28195
[11] Agrawal, A., Which email application is right for you: Outlook or Gmail? Retrieved August 18, 2014, from https://blogs.office.com/enus/ 2014/08/18/email-application-right-outlook-gmail/?eu=true
[12] Siledar, S., "File Encryption, Decryption Using AES Algorithm in Android Phone." International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 5, pp. 550-554 (2015).
[13] Kashyap, S.; Madan, E.N., "A Review on: Network Security and Cryptographic Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering. vol. 5, no.1 (2015).
[14] Abd Elminaam, D. S.; Abdual Kader, H. M.; hadhoud, M. M.,"Evaluating the Performance of Symmetric Encryption Algorithms."International Journal of Network Security, vol. 10, no. 3, pp. 213-219 (2010).
[15] Stellar Blue Technologies. (2015, August 4). Scary Hacking Statistics You Probably Didn’t Know About. Retrieved November 15, 2017,from https://stellarbluetechnologies.com/2015/08/4-scary-hackingstatistics/
[16] Mathur, M.; Kesarwani, A., "Comparison between DES, 3DES, RC2,RC6, BLOWFISH and AES." Proceedings of National Conference on New Horizons IN IT – NCNHIT (2013).