Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment.
Ambili ThomasV. Lakshmi NarasimhanPublished in: FICTA (2) (2020)
Keyphrases
- encryption algorithm
- mobile environments
- encryption algorithms
- security analysis
- mobile devices
- mobile users
- mobile computing
- s box
- location based services
- pseudorandom
- advanced encryption standard
- data encryption
- computing environments
- context aware
- digital content
- mobile agents
- mobile networks
- ciphertext
- mobile applications
- secret key
- encryption scheme
- mobile phone