메뉴 건너뛰기




Volumn 27, Issue 5-6, 2008, Pages 154-167

SMSSec: An end-to-end protocol for secure SMS

Author keywords

Cryptography; Mobile devices; Protocols; Small Message Service; Wireless Messaging API

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); CRYPTOGRAPHY; ELECTRONIC COMMERCE; FAULT TOLERANCE; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; QUALITY ASSURANCE; RELIABILITY; TELECOMMUNICATION; TELECOMMUNICATION EQUIPMENT;

EID: 53049088300     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.05.003     Document Type: Article
Times cited : (48)

References (37)
  • 2
    • 53049103787 scopus 로고    scopus 로고
    • Croft NJ, Olivier MS. Using an approximated one-time pad to secure short messaging service (SMS). In: Proceedings of the southern African telecommunication networks and applications conference (SATNAC); 2005. p. 71-6.
    • Croft NJ, Olivier MS. Using an approximated one-time pad to secure short messaging service (SMS). In: Proceedings of the southern African telecommunication networks and applications conference (SATNAC); 2005. p. 71-6.
  • 3
    • 33749048456 scopus 로고    scopus 로고
    • Debbabi Mourad, Saleh Mohamed, Talhi Chamseddine, Zhioua Sami. Security analysis of Mobile Java. In: Proceedings of the sixteenth international workshop on database and expert systems applications; 2005. p. 231-25.
    • Debbabi Mourad, Saleh Mohamed, Talhi Chamseddine, Zhioua Sami. Security analysis of Mobile Java. In: Proceedings of the sixteenth international workshop on database and expert systems applications; 2005. p. 231-25.
  • 4
    • 0004181422 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 12.7.04]
    • Daemen J., and Rijmen V. AES proposal: Rijndael. [Online]. Available from: (1999). http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf [accessed 12.7.04]
    • (1999) AES proposal: Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 6
    • 33745796561 scopus 로고    scopus 로고
    • Enck William, Traynor Patrick, McDaniel Patrick, La Porta Thomas. Exploiting open functionality in SMS-capable cellular networks. In: 12th ACM conference on computer and communications security, Alexandria, VA, USA; 2005. p. 393-404.
    • Enck William, Traynor Patrick, McDaniel Patrick, La Porta Thomas. Exploiting open functionality in SMS-capable cellular networks. In: 12th ACM conference on computer and communications security, Alexandria, VA, USA; 2005. p. 393-404.
  • 7
    • 2542521157 scopus 로고    scopus 로고
    • Wiley Publishing, Indianapolis, Indiana p. 75-82, 89-91, 233, 350-52.
    • Ferguson N., and Schneier B. Practical cryptography (2003), Wiley Publishing, Indianapolis, Indiana p. 75-82, 89-91, 233, 350-52.
    • (2003) Practical cryptography
    • Ferguson, N.1    Schneier, B.2
  • 8
    • 53049085448 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 11.10.05]
    • First National Bank. Cellphone banking. [Online]. Available from: (2005). https://www.fnb.co.za/personal/transact/accessyouraccounts/cellphonebanking.html [accessed 11.10.05]
    • (2005) Cellphone banking
    • First National Bank1
  • 9
    • 0036039575 scopus 로고    scopus 로고
    • Gindraux S. From 2G to 3G: a guide to mobile security. In: Proceedings of the third international conference on 3G mobile communication technologies; 2002. p. 308-11.
    • Gindraux S. From 2G to 3G: a guide to mobile security. In: Proceedings of the third international conference on 3G mobile communication technologies; 2002. p. 308-11.
  • 10
    • 0037376798 scopus 로고    scopus 로고
    • Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration
    • Grecas C.F., Maniatis S.I., and Venieris I.S. Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications 8 (2003) 145-150
    • (2003) Mobile Networks and Applications , vol.8 , pp. 145-150
    • Grecas, C.F.1    Maniatis, S.I.2    Venieris, I.S.3
  • 12
    • 53049110505 scopus 로고    scopus 로고
    • Kolsi Otto, Virtanen Teemupekka. MIDP 2.0 security enhancements. In: Proceedings of the 37th Hawaii international conference on system sciences, Hawaii; 2004. p. 287-94.
    • Kolsi Otto, Virtanen Teemupekka. MIDP 2.0 security enhancements. In: Proceedings of the 37th Hawaii international conference on system sciences, Hawaii; 2004. p. 287-94.
  • 14
    • 0141569860 scopus 로고    scopus 로고
    • Lightweight security for mobile commerce transactions
    • Lam K.Y., Chung S., Gu M., and Sun J. Lightweight security for mobile commerce transactions. IEEE Computer Communications 26 (2003) 2052-2060
    • (2003) IEEE Computer Communications , vol.26 , pp. 2052-2060
    • Lam, K.Y.1    Chung, S.2    Gu, M.3    Sun, J.4
  • 15
    • 53049092957 scopus 로고    scopus 로고
    • Lo Johnny Li-Chang, Bishop Judith. Component-based interchangeable cryptographic architecture for securing wireless connectivity in Java applications. In: Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists, Johannesburg, South Africa; 2003. p. 301-7.
    • Lo Johnny Li-Chang, Bishop Judith. Component-based interchangeable cryptographic architecture for securing wireless connectivity in Java applications. In: Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists, Johannesburg, South Africa; 2003. p. 301-7.
  • 17
    • 53049088373 scopus 로고    scopus 로고
    • National Communications System. SMS over SS7. Technical information bulletin 03-2, 39, 41; 2003.
    • National Communications System. SMS over SS7. Technical information bulletin 03-2, 39, 41; 2003.
  • 18
    • 47849128781 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 16.06.05]
    • Ortiz E. The wireless messaging API. [Online]. Available from: (2002). http://developers.sun.com/techtopics/mobility/midp/articles/wma/index.html [accessed 16.06.05]
    • (2002) The wireless messaging API
    • Ortiz, E.1
  • 20
    • 53049102548 scopus 로고    scopus 로고
    • RSA Laboratories. PKCS#5 v2.0: password-based cryptography standards. PCKS Standards; 1999.
    • RSA Laboratories. PKCS#5 v2.0: password-based cryptography standards. PCKS Standards; 1999.
  • 21
    • 53049106804 scopus 로고    scopus 로고
    • RSA Laboratories. PKCS#1 v2.1: RSA cryptography standard. PCKS Standards; 2002.
    • RSA Laboratories. PKCS#1 v2.1: RSA cryptography standard. PCKS Standards; 2002.
  • 24
    • 53049088223 scopus 로고    scopus 로고
    • Sun Microsystems. JSR 197: generic connection framework optional package for the J2SE platform; 2003.
    • Sun Microsystems. JSR 197: generic connection framework optional package for the J2SE platform; 2003.
  • 25
    • 53049090589 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 18.10.05]
    • Sun Microsystems. The WMA 2.0 specification. [Online]. Available from: (2004). http://java.sun.com/products/wma/ [accessed 18.10.05]
    • (2004) The WMA 2.0 specification
    • Sun Microsystems1
  • 26
    • 53049097485 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 14.11.05]
    • Sun Microsystems. J2ME devices. [Online]. Available from: (2005). http://developers.sun.com/techtopics/mobility/device/device [accessed 14.11.05]
    • (2005) J2ME devices
    • Sun Microsystems1
  • 27
    • 53049084382 scopus 로고    scopus 로고
    • Sun Microsystems. Wireless messaging API (WMA) JSR 120 and JSR 205; 2005b.
    • Sun Microsystems. Wireless messaging API (WMA) JSR 120 and JSR 205; 2005b.
  • 30
    • 53049085301 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 10.10.05]
    • The Legion of BouncyCastle. BouncyCastle API. [Online]. Available from: (2005). www.bouncycastle.org [accessed 10.10.05]
    • (2005) BouncyCastle API
    • The Legion of BouncyCastle1
  • 31
    • 84882788656 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 25.04.07]
    • The AVISPA Team. The AVISPA project. [Online]. Available from: (2007). www.avispa-project.org [accessed 25.04.07]
    • (2007) The AVISPA project
    • The AVISPA Team1
  • 32
    • 53049086461 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 15.11.05]
    • Clements Tom. SMS - short but sweet. [Online]. Available from: (2003). http://developers.sun.com/techtopics/mobility/midp/articles/sms/ [accessed 15.11.05]
    • (2003) SMS - short but sweet
    • Clements Tom1
  • 33
    • 0038443119 scopus 로고    scopus 로고
    • Next generation security for wireless: elliptic curve cryptography
    • Vanstone S.A. Next generation security for wireless: elliptic curve cryptography. Computers and Security 22 (2003) 12-44
    • (2003) Computers and Security , vol.22 , pp. 12-44
    • Vanstone, S.A.1
  • 35
    • 53049105445 scopus 로고    scopus 로고
    • Wang Xiaoyun, Lisa Yin Yiqun, Yu Hongbo. Finding collisions in the full SHA-1. In: Crypto 2005, Santa Barbara, California, USA; 2005. p. 17-36.
    • Wang Xiaoyun, Lisa Yin Yiqun, Yu Hongbo. Finding collisions in the full SHA-1. In: Crypto 2005, Santa Barbara, California, USA; 2005. p. 17-36.
  • 36
    • 84899368689 scopus 로고    scopus 로고
    • [Online]. Available from: [accessed 10.11.05]
    • Wikipedia. Short message service. [Online]. Available from: (2005). http://en.wikipedia.org/wiki/Short_Message_Service [accessed 10.11.05]
    • (2005) Short message service
    • Wikipedia1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.