PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
A. Elmadani. International Educational Applied Scientific Research Journal, 2 (1):
10-12(January 2017)
Abstract
Due to the complicity of the nowadays life, people need to do several things at the same time in work, athome. This can be done only if personal resource can be accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely adesktop computer(DC) at home remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that proposed algorithm can be applied to perform tasks to help people in work or at home simultaneously.
%0 Journal Article
%1 noauthororeditor
%A Elmadani, Ahmed B.
%D 2017
%J International Educational Applied Scientific Research Journal
%K IEASRJ
%N 1
%P 10-12
%T PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
%U http://ieasrj.com/journal/index.php/ieasrj/article/view/24
%V 2
%X Due to the complicity of the nowadays life, people need to do several things at the same time in work, athome. This can be done only if personal resource can be accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely adesktop computer(DC) at home remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that proposed algorithm can be applied to perform tasks to help people in work or at home simultaneously.
@article{noauthororeditor,
abstract = {Due to the complicity of the nowadays life, people need to do several things at the same time in work, athome. This can be done only if personal resource can be accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely adesktop computer(DC) at home remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that proposed algorithm can be applied to perform tasks to help people in work or at home simultaneously.},
added-at = {2017-04-17T11:53:46.000+0200},
author = {Elmadani, Ahmed B.},
biburl = {https://www.bibsonomy.org/bibtex/2d58fb1af22d50936fa915a4e8e9c619b/editorieasrj},
interhash = {fcc314ec3a58d4b176321d80e8961ed9},
intrahash = {d58fb1af22d50936fa915a4e8e9c619b},
journal = {International Educational Applied Scientific Research Journal},
keywords = {IEASRJ},
month = {January},
number = 1,
pages = {10-12},
timestamp = {2017-04-17T11:53:46.000+0200},
title = {PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE},
url = {http://ieasrj.com/journal/index.php/ieasrj/article/view/24},
volume = 2,
year = 2017
}