Secure mobile application on GoogleTM android

More than half the world‟s population now has access to mobile phones. While these devices enable spoken communication, many users (especially teenagers and young adults) heavily employ them for sending and receiving written text messages. So it is important that every mobile phone had its...

Full description

Saved in:
Bibliographic Details
Main Author: Lee, Chun Fong.
Other Authors: Ng Chee Hock
Format: Final Year Project
Language:English
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/10356/49454
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-49454
record_format dspace
spelling sg-ntu-dr.10356-494542023-07-07T17:30:30Z Secure mobile application on GoogleTM android Lee, Chun Fong. Ng Chee Hock School of Electrical and Electronic Engineering Chan Choong Wah DRNTU::Engineering::Electrical and electronic engineering::Applications of electronics More than half the world‟s population now has access to mobile phones. While these devices enable spoken communication, many users (especially teenagers and young adults) heavily employ them for sending and receiving written text messages. So it is important that every mobile phone had its own security function. As now the Android operating system is getting more commonly used on different brand of mobile phone like Samsung, HTC, LG and etc. It is important that our contents in mobile phones are fully secure and safe from malware and hackers, so that any information sent will not be eavesdropping but others or getting viruses into your phone. But how do we secure all this contents? The answer is by adding a security function like public-key cryptography on the contacts. Once the contacts are secure by the key, those non related peoples that wanted to eavesdrop into the contents will had a hard time. It also nearly impossible to hack into the content if those hackers does not know those keys. The main objective of this report is to make the mobile phones secured by implementing the method to make every single contact that each of it will have a “keys”. So how should it be implemented and what are the steps to create those security function will be shown in those chapters of the report. Bachelor of Engineering 2012-05-18T08:08:59Z 2012-05-18T08:08:59Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/49454 en Nanyang Technological University 47 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Applications of electronics
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Applications of electronics
Lee, Chun Fong.
Secure mobile application on GoogleTM android
description More than half the world‟s population now has access to mobile phones. While these devices enable spoken communication, many users (especially teenagers and young adults) heavily employ them for sending and receiving written text messages. So it is important that every mobile phone had its own security function. As now the Android operating system is getting more commonly used on different brand of mobile phone like Samsung, HTC, LG and etc. It is important that our contents in mobile phones are fully secure and safe from malware and hackers, so that any information sent will not be eavesdropping but others or getting viruses into your phone. But how do we secure all this contents? The answer is by adding a security function like public-key cryptography on the contacts. Once the contacts are secure by the key, those non related peoples that wanted to eavesdrop into the contents will had a hard time. It also nearly impossible to hack into the content if those hackers does not know those keys. The main objective of this report is to make the mobile phones secured by implementing the method to make every single contact that each of it will have a “keys”. So how should it be implemented and what are the steps to create those security function will be shown in those chapters of the report.
author2 Ng Chee Hock
author_facet Ng Chee Hock
Lee, Chun Fong.
format Final Year Project
author Lee, Chun Fong.
author_sort Lee, Chun Fong.
title Secure mobile application on GoogleTM android
title_short Secure mobile application on GoogleTM android
title_full Secure mobile application on GoogleTM android
title_fullStr Secure mobile application on GoogleTM android
title_full_unstemmed Secure mobile application on GoogleTM android
title_sort secure mobile application on googletm android
publishDate 2012
url http://hdl.handle.net/10356/49454
_version_ 1772826866130878464