-
2
-
-
53049103787
-
-
Croft NJ, Olivier MS. Using an approximated one-time pad to secure short messaging service (SMS). In: Proceedings of the southern African telecommunication networks and applications conference (SATNAC); 2005. p. 71-6.
-
Croft NJ, Olivier MS. Using an approximated one-time pad to secure short messaging service (SMS). In: Proceedings of the southern African telecommunication networks and applications conference (SATNAC); 2005. p. 71-6.
-
-
-
-
3
-
-
33749048456
-
-
Debbabi Mourad, Saleh Mohamed, Talhi Chamseddine, Zhioua Sami. Security analysis of Mobile Java. In: Proceedings of the sixteenth international workshop on database and expert systems applications; 2005. p. 231-25.
-
Debbabi Mourad, Saleh Mohamed, Talhi Chamseddine, Zhioua Sami. Security analysis of Mobile Java. In: Proceedings of the sixteenth international workshop on database and expert systems applications; 2005. p. 231-25.
-
-
-
-
4
-
-
0004181422
-
-
[Online]. Available from: [accessed 12.7.04]
-
Daemen J., and Rijmen V. AES proposal: Rijndael. [Online]. Available from: (1999). http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf [accessed 12.7.04]
-
(1999)
AES proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
5
-
-
0004092884
-
-
The Benjamin/Cummings Publishing Company, Inc, Redwood City, California p. 595-6
-
Elmasri R.A., and Navathe S.B. Fundamentals of database systems. 2nd ed. (1994), The Benjamin/Cummings Publishing Company, Inc, Redwood City, California p. 595-6
-
(1994)
Fundamentals of database systems. 2nd ed.
-
-
Elmasri, R.A.1
Navathe, S.B.2
-
6
-
-
33745796561
-
-
Enck William, Traynor Patrick, McDaniel Patrick, La Porta Thomas. Exploiting open functionality in SMS-capable cellular networks. In: 12th ACM conference on computer and communications security, Alexandria, VA, USA; 2005. p. 393-404.
-
Enck William, Traynor Patrick, McDaniel Patrick, La Porta Thomas. Exploiting open functionality in SMS-capable cellular networks. In: 12th ACM conference on computer and communications security, Alexandria, VA, USA; 2005. p. 393-404.
-
-
-
-
7
-
-
2542521157
-
-
Wiley Publishing, Indianapolis, Indiana p. 75-82, 89-91, 233, 350-52.
-
Ferguson N., and Schneier B. Practical cryptography (2003), Wiley Publishing, Indianapolis, Indiana p. 75-82, 89-91, 233, 350-52.
-
(2003)
Practical cryptography
-
-
Ferguson, N.1
Schneier, B.2
-
8
-
-
53049085448
-
-
[Online]. Available from: [accessed 11.10.05]
-
First National Bank. Cellphone banking. [Online]. Available from: (2005). https://www.fnb.co.za/personal/transact/accessyouraccounts/cellphonebanking.html [accessed 11.10.05]
-
(2005)
Cellphone banking
-
-
First National Bank1
-
9
-
-
0036039575
-
-
Gindraux S. From 2G to 3G: a guide to mobile security. In: Proceedings of the third international conference on 3G mobile communication technologies; 2002. p. 308-11.
-
Gindraux S. From 2G to 3G: a guide to mobile security. In: Proceedings of the third international conference on 3G mobile communication technologies; 2002. p. 308-11.
-
-
-
-
10
-
-
0037376798
-
Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration
-
Grecas C.F., Maniatis S.I., and Venieris I.S. Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications 8 (2003) 145-150
-
(2003)
Mobile Networks and Applications
, vol.8
, pp. 145-150
-
-
Grecas, C.F.1
Maniatis, S.I.2
Venieris, I.S.3
-
12
-
-
53049110505
-
-
Kolsi Otto, Virtanen Teemupekka. MIDP 2.0 security enhancements. In: Proceedings of the 37th Hawaii international conference on system sciences, Hawaii; 2004. p. 287-94.
-
Kolsi Otto, Virtanen Teemupekka. MIDP 2.0 security enhancements. In: Proceedings of the 37th Hawaii international conference on system sciences, Hawaii; 2004. p. 287-94.
-
-
-
-
15
-
-
53049092957
-
-
Lo Johnny Li-Chang, Bishop Judith. Component-based interchangeable cryptographic architecture for securing wireless connectivity in Java applications. In: Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists, Johannesburg, South Africa; 2003. p. 301-7.
-
Lo Johnny Li-Chang, Bishop Judith. Component-based interchangeable cryptographic architecture for securing wireless connectivity in Java applications. In: Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists, Johannesburg, South Africa; 2003. p. 301-7.
-
-
-
-
17
-
-
53049088373
-
-
National Communications System. SMS over SS7. Technical information bulletin 03-2, 39, 41; 2003.
-
National Communications System. SMS over SS7. Technical information bulletin 03-2, 39, 41; 2003.
-
-
-
-
18
-
-
47849128781
-
-
[Online]. Available from: [accessed 16.06.05]
-
Ortiz E. The wireless messaging API. [Online]. Available from: (2002). http://developers.sun.com/techtopics/mobility/midp/articles/wma/index.html [accessed 16.06.05]
-
(2002)
The wireless messaging API
-
-
Ortiz, E.1
-
20
-
-
53049102548
-
-
RSA Laboratories. PKCS#5 v2.0: password-based cryptography standards. PCKS Standards; 1999.
-
RSA Laboratories. PKCS#5 v2.0: password-based cryptography standards. PCKS Standards; 1999.
-
-
-
-
21
-
-
53049106804
-
-
RSA Laboratories. PKCS#1 v2.1: RSA cryptography standard. PCKS Standards; 2002.
-
RSA Laboratories. PKCS#1 v2.1: RSA cryptography standard. PCKS Standards; 2002.
-
-
-
-
22
-
-
0011190730
-
Performance comparison of the AES submissions
-
NIST
-
Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., and Ferguson N. Performance comparison of the AES submissions. Proceedings of second AES candidate conference (1999), NIST 15-34
-
(1999)
Proceedings of second AES candidate conference
, pp. 15-34
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
24
-
-
53049088223
-
-
Sun Microsystems. JSR 197: generic connection framework optional package for the J2SE platform; 2003.
-
Sun Microsystems. JSR 197: generic connection framework optional package for the J2SE platform; 2003.
-
-
-
-
25
-
-
53049090589
-
-
[Online]. Available from: [accessed 18.10.05]
-
Sun Microsystems. The WMA 2.0 specification. [Online]. Available from: (2004). http://java.sun.com/products/wma/ [accessed 18.10.05]
-
(2004)
The WMA 2.0 specification
-
-
Sun Microsystems1
-
26
-
-
53049097485
-
-
[Online]. Available from: [accessed 14.11.05]
-
Sun Microsystems. J2ME devices. [Online]. Available from: (2005). http://developers.sun.com/techtopics/mobility/device/device [accessed 14.11.05]
-
(2005)
J2ME devices
-
-
Sun Microsystems1
-
27
-
-
53049084382
-
-
Sun Microsystems. Wireless messaging API (WMA) JSR 120 and JSR 205; 2005b.
-
Sun Microsystems. Wireless messaging API (WMA) JSR 120 and JSR 205; 2005b.
-
-
-
-
30
-
-
53049085301
-
-
[Online]. Available from: [accessed 10.10.05]
-
The Legion of BouncyCastle. BouncyCastle API. [Online]. Available from: (2005). www.bouncycastle.org [accessed 10.10.05]
-
(2005)
BouncyCastle API
-
-
The Legion of BouncyCastle1
-
31
-
-
84882788656
-
-
[Online]. Available from: [accessed 25.04.07]
-
The AVISPA Team. The AVISPA project. [Online]. Available from: (2007). www.avispa-project.org [accessed 25.04.07]
-
(2007)
The AVISPA project
-
-
The AVISPA Team1
-
32
-
-
53049086461
-
-
[Online]. Available from: [accessed 15.11.05]
-
Clements Tom. SMS - short but sweet. [Online]. Available from: (2003). http://developers.sun.com/techtopics/mobility/midp/articles/sms/ [accessed 15.11.05]
-
(2003)
SMS - short but sweet
-
-
Clements Tom1
-
33
-
-
0038443119
-
Next generation security for wireless: elliptic curve cryptography
-
Vanstone S.A. Next generation security for wireless: elliptic curve cryptography. Computers and Security 22 (2003) 12-44
-
(2003)
Computers and Security
, vol.22
, pp. 12-44
-
-
Vanstone, S.A.1
-
35
-
-
53049105445
-
-
Wang Xiaoyun, Lisa Yin Yiqun, Yu Hongbo. Finding collisions in the full SHA-1. In: Crypto 2005, Santa Barbara, California, USA; 2005. p. 17-36.
-
Wang Xiaoyun, Lisa Yin Yiqun, Yu Hongbo. Finding collisions in the full SHA-1. In: Crypto 2005, Santa Barbara, California, USA; 2005. p. 17-36.
-
-
-
-
36
-
-
84899368689
-
-
[Online]. Available from: [accessed 10.11.05]
-
Wikipedia. Short message service. [Online]. Available from: (2005). http://en.wikipedia.org/wiki/Short_Message_Service [accessed 10.11.05]
-
(2005)
Short message service
-
-
Wikipedia1
|