Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/15221
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | KUMAR, DEEPAK | - |
dc.date.accessioned | 2016-10-20T05:08:18Z | - |
dc.date.available | 2016-10-20T05:08:18Z | - |
dc.date.issued | 2016-10 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/15221 | - |
dc.description.abstract | End-to-End Secured and Optimized Mobile Computing Model describes a Mobile Application and software technology that makes it possible to run in an area having low bandwidth maintaining the security of the data travelled through insecure channel. Web technology in conjunction with today’s mobile devices and the emerging wireless technologies (e.g., digital cellular, packet radio) offer the potential for unprecedented access to data and applications by mobile workers. Yet, the limited bandwidth, high latency, high cost, and poor reliability of today’s wireless wide-area networks greatly inhibits supporting such applications over wireless networks. End to End secured and optimized model allows user to run the application on android platform to encrypt the data before it is transmitted over the wireless network and decrypt data before being shown on display structure of mobile device. It allows security of information in transmission and reception process. As data communication happens through wireless link before reaching base station from source, End to End security of data ensures data sent from the source to destination must preserve data security. In addition, it presents system for enhancing performance that reduces data volume and latency of wireless communications by performing various optimizations like compression. It makes possible to run World Wide Web applications in wide area wireless networks. This report presents the End-to-End Secured and Optimized Mobile Computing Model that makes it possible to run such handy applications efficiently in mobile networks. | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | TD NO.2460; | - |
dc.subject | MOBILE COMPUTING MODEL | en_US |
dc.subject | END TO END SECURED | en_US |
dc.subject | OPTIMIZATION | en_US |
dc.subject | DATA COMMUNICATION | en_US |
dc.subject | MOBILE NETWORKS | en_US |
dc.title | END TO END SECURED AND OPTIMIZED MOBILE COMPUTING MODEL | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Thesis Major_Mtech_Project_Deepak_2k13cse26.pdf | 2.03 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.