Mobile money transfer services: the next phase in the evolution of person-to-person payments

C Merritt - Journal of Payments Strategy & Systems, 2011 - ingentaconnect.com
Money transfer schemes have evolved to the next generation of electronic payments—the
mobile channel. Money transfer services for both domestic and international remittances are …

Conducting surveys and data collection: From traditional to mobile and SMS-based surveys

I Alam, S Khusro, A Rauf, Q Zaman - Pakistan Journal of Statistics and …, 2014 - pjsor.com
Fresh, bias-free and valid data collected using different survey modes is considered an
essential requirement for smooth functioning and evolution of an organization. Surveys play …

[PDF][PDF] Data security using private key encryption system based on arithmetic coding

A Singh, R Gilhotra - … Journal of Network Security & Its …, 2011 - anthony-claretonwutalobi.com
Problem faced by today's communicators is not only security but also the speed of
communication and size of content. In the present paper, a scheme has been proposed …

[HTML][HTML] A hybrid approach to secure and compress data streams in cloud computing environment

A Abdo, TS Karamany, A Yakoub - … of King Saud University-Computer and …, 2024 - Elsevier
Cloud computing has revolutionized the way businesses and individuals manage and utilize
computing resources, providing significant benefits such as scalability, flexibility, and cost …

[HTML][HTML] Improving compression of short messages

P Gardner-Stephen, A Bettison, R Challans… - Int'l J. of …, 2013 - scirp.org
Compression of short text strings, such as the GSM Short Message Service (SMS) and
Twitter messages, has received relatively little attention compared to the compression of …

[PDF][PDF] Cryptographic techniques in information security

RK Choubey, A Hashmi - Int. J. Sci. Res. Comput. Sci. Eng. Inf …, 2018 - researchgate.net
This paper focuses on the role of cryptography in the information security system and
discussed some of the techniques which are used in cryptography. Earlier, Cryptography …

Integrated encryption in dynamic arithmetic compression

ST Klein, D Shapira - Information and Computation, 2021 - Elsevier
A variant of adaptive arithmetic coding is proposed, adding cryptographic features to this
classical compression method. The idea is to perform the updates of the frequency tables for …

A survey study on joint image compression-encryption methods

S SerElkhetm, S Heshmat - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Images form a significant part of data, particularly in multimedia and video conferencing
applications. Many techniques and algorithms for image compression and encryption are …

Secured mobile messaging

RR Chavan, M Sabnees - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
SMS messages are one of the popular ways of communication. Sending an SMS is cheap,
fast and simple. When confidential information is exchanged using SMS, it is very difficult to …

Sms security for smartphone

AM Sagheer, AA Abdulhameed… - … on Developments in …, 2013 - ieeexplore.ieee.org
The most popular and easiest communication technology in mobile phone devices is Short
Message Service (SMS). This service is designed to transfer unsecured information. Some …