Implementation of Encryption and Decryption Algorithms for Security of Mobile Devices.
B. V. VarunAbhishek M. VAkshay Chanabasappa GangadharU. PurushothamPublished in: ICCT (2019)
Keyphrases
- mobile devices
- theoretical analysis
- efficient implementation
- learning algorithm
- significant improvement
- optimization problems
- computationally efficient
- times faster
- computational cost
- information security
- mobile phone
- context aware
- intrusion detection
- machine learning algorithms
- orders of magnitude
- complexity analysis