Encrypted SMS App: Reliable Data Security (RDS)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 382 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science and Information Technology | India | Volume 9 Issue 1, January 2020 | Popularity: 6.5 / 10


     

Encrypted SMS App: Reliable Data Security (RDS)

Lt Col Rahul Dutt Sharma


Abstract: Reliable Data Security (RDS) is an android mobile app that encrypts the SMS using AES-256 bit Encryption technique thereby making optimum utilization of existing civil mobile infrastructure as per the military/government department's requirement. It is a server-independent mobile app with no third party software/tool. In addition to transmitting encrypted SMS, RDS is integrated with in-built GPS to transfer own geo-location in encrypted format.


Keywords: Encryption, mobile security, Encrypted SMS, AES-256, OTP based authorization, Own geo-location, Files locker


Edition: Volume 9 Issue 1, January 2020


Pages: 1668 - 1668



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Lt Col Rahul Dutt Sharma, "Encrypted SMS App: Reliable Data Security (RDS)", International Journal of Science and Research (IJSR), Volume 9 Issue 1, January 2020, pp. 1668-1668, https://www.ijsr.net/getabstract.php?paperid=ART20204308, DOI: https://www.doi.org/10.21275/ART20204308

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, Kenya, Volume 11 Issue 2, February 2022

Pages: 401 - 405

Security Measures for Protecting of Information Technology Assets

Masese Nelson

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 7, July 2024

Pages: 1190 - 1194

Serverless Security: Best Practices for Protecting Functions-as-a-Service

Yamini Kannan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, India, Volume 11 Issue 1, January 2022

Pages: 359 - 363

Arithmetic Addition Coding and Linear Invertible Equation using Prime Modulo with Multiplicative Inverse for Text Encryption

N. Subramanyan, Dr. K. Arunesh

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Review Papers, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024

Pages: 181 - 184

Secure Data Outsourcing Techniques for Cloud Storage

Ankur Mahida

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

New Innovation and Idea, Computer Science and Information Technology, India, Volume 13 Issue 10, October 2024

Pages: 1341 - 1343

Secure On-Demand Access to Domestic CCTV Footage Using Privacy-Centric Client-Server Architecture

Dr. Linoy A Tharakan

Share this Article



Top