PROTECTED DESKTOPACCESS BASED ON USE OF MOBILE PHONE

Ahmed B. Elmadani

Abstract


Due to the complicity of the nowadays life, people need to do several things at the same time in work, athome. This can be done only if personal resource can be accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely adesktop computer(DC) at home remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that proposed algorithm can be applied to perform tasks to help people in work or at home simultaneously.

Keywords


MP, remote DC, resource access, RC5

Full Text:

PDF

References


Nield D.(2012). How To Control Your Computer With Your Phone.http://gizmodo.com.

Rhee E.(2011).How to control computers remotely with your Android phone http://www.cnet.com

Garnett A.(2013). How to control your PC with your Android phone.PCWorld http://www.pcworld.com

CriderM.(2015). Use your PC from the couch – or anywhere – with these smartphone apps. http://www.digitaltrends.com

Taichung C. Y, andKou M.(2005). Remotemonitoring and control of PC clusters using mobile phones with J2ME. 3rd International Conference on Information Technology: Research and Education.

Mule O, Shaikh N, Shinde P, Wagaskar A, RamtekeS.(2016). Remote Access of Android Smart Phone. International Journal of Computer Science and Information Technologies, Vol. 7 (2) PP 711-714.

Bharathi J. C. and Rao T.Y.S.(2012).Remote computer access through Android mobiles. International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3.ISSN (Online): 1694-0814.

Bhandari K. S., Mandole V. B., Sachin B. Munde T. A. D. (2015). Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser. International Journal of Computer Science and Information Technology Research ISSN 2348-120X. Vol. 3, Issue 1, pp: (369-373).

Elmadani A. B.(2013).Multiple layer security in protecting Arabic-unicode sensitive information based on stenography and cryptographic algorithms. Proceedings of the second International Conference on Informatics & Applications (ICIA2013). Vol. No. 1. Pp 19-23. Lodz Poland. ISBN: 978.1.467305255.0©2013IEEE.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.