-
1
-
-
59249104385
-
-
Mobile Data Association Press Release, February 4, 2008, Online, Available:, Accessed March 13, 2008
-
Mobile Data Association (Press Release), "The Q1 2008 UK Mobile Trends Report," February 4, 2008. [Online]. Available: http://www.themda.org/documents/PressReleases/Switch /MDA_Q1_2008_UK_mobile_report.pd f. [Accessed March 13, 2008].
-
The Q1 2008 UK Mobile Trends Report
-
-
-
2
-
-
59249108318
-
-
Telecom Asia, March 3, 2006, Online, Available:, Accessed April 18, 2008
-
Telecom Asia, "SMS is top service for Asian mobile phone users," March 3, 2006. [Online]. Available: http://www. feedsfarm.com/article/447aea1518911c20d63c0c08dfe0ce00e6ad59ae. html. [Accessed April 18, 2008].
-
SMS is top service for Asian mobile phone users
-
-
-
3
-
-
59249102995
-
-
October 14, 2003, Online, Available:, Accessed April 18, 2008
-
C. Jane, "Mobile SMS Unit Increases Direct Connectivity With Local Mobile Network Operators in China," October 14, 2003. [Online]. Available: http://www.inc.china.com/admin/upload/newsroom/press/ ep031014.pdf. [Accessed April 18, 2008].
-
Mobile SMS Unit Increases Direct Connectivity With Local Mobile Network Operators in China
-
-
Jane, C.1
-
4
-
-
85059221313
-
Multiuser cryptographic techniques
-
W. Diffie and M. Hellman, "Multiuser cryptographic techniques," in AFIPS Conference, 1976, Volume 45, pages 109-112.
-
(1976)
AFIPS Conference
, vol.45
, pp. 109-112
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
59249100417
-
-
RSA Laboratories, May 11, 2008, Online, Available:, Accessed May 11, 2008
-
RSA Laboratories, "Chapter 3 Technique in Cryptography: What is Diffie-Hellman?," May 11, 2008. [Online]. Available: http://www. rsa.com/rsalabs/node.asp?id=2248. [Accessed May 11, 2008].
-
Technique in Cryptography: What is Diffie-Hellman
-
-
-
6
-
-
59249104518
-
-
Discretix Technologies Ltd, October, Online, Available:, Accessed April 12, 2007
-
L. Elboz, "Using Public Key Cryptography in Mobile Phones," Discretix Technologies Ltd, October 2002. [Online]. Available: http:// www.discretix.com/PDF/Using%20Public%20Key%20Cryptography%20in% 20Mobile%20Phones.pdf. [Accessed April 12, 2007].
-
(2002)
Using Public Key Cryptography in Mobile Phones
-
-
Elboz, L.1
-
7
-
-
33746248681
-
Design and Implementation of a PKI-Based End to End Secure Infrastructure for Mobile e-Commerce
-
December
-
T. Chanson and C. Tin-Wo, "Design and Implementation of a PKI-Based End to End Secure Infrastructure for Mobile e-Commerce", World Wide Web, vol. 4, no.4, pp 235-253, December 2001.
-
(2001)
World Wide Web
, vol.4
, Issue.4
, pp. 235-253
-
-
Chanson, T.1
Tin-Wo, C.2
-
8
-
-
84944058154
-
Virtual Software Tokens - A Practical Way to Secure PKI Roaming
-
T. Kwon, "Virtual Software Tokens - A Practical Way to Secure PKI Roaming," in Lecture Notes in Computer Science, Vol. 2437, pp 288-302, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2437
, pp. 288-302
-
-
Kwon, T.1
-
10
-
-
59249088514
-
-
March, Online, Available:, Accessed March 22, 2008
-
Tadashi Kaji, "Mobile PKI Framework (1): HITACHI-SDL," March 2008. [Online]. Available: http://www.sdl.hitachi.co.jp/english/people /pki/index01.html. [Accessed March 22, 2008].
-
(2008)
Mobile PKI Framework (1): HITACHI-SDL
-
-
Kaji, T.1
-
12
-
-
77952707508
-
-
IPCS Group, March 22, 2008, Online, Available:, Accessed 22 March 2008
-
IPCS Group, "IPCryptSim SMS Encryption," March 22, 2008. [Online]. Available: http://www.ipcslive.com/pdf/IPCSmbank.pdf. [Accessed 22 March 2008].
-
IPCryptSim SMS Encryption
-
-
-
13
-
-
59249083254
-
-
Forum Nokia Style Guide Version 3.0, March 2003. [Online]. Available: http://www.differnet.com/crose/Samples/CRose-NokiaStyle.pdf. [Accessed February 22, 2008].
-
"Forum Nokia Style Guide Version 3.0," March 2003. [Online]. Available: http://www.differnet.com/crose/Samples/CRose-NokiaStyle.pdf. [Accessed February 22, 2008].
-
-
-
-
14
-
-
59249097692
-
-
May 22, 2008, Online, Available:, Accessed May 22, 2008
-
Sony Ericsson, "MMS Developers' Guidelines Feature Phones," May 22, 2008. [Online]. Available: http://developer.sonyericsson.com /site/global/docstools/messaging/p_messaging.jsp. [Accessed May 22, 2008].
-
MMS Developers' Guidelines Feature Phones
-
-
-
15
-
-
59249097827
-
-
The Legion of Bouncy Castle, Feb.8, 2008. [Online]. Available: http://www.bouncycastle.org. [Accessed February 8, 2008].
-
"The Legion of Bouncy Castle," Feb.8, 2008. [Online]. Available: http://www.bouncycastle.org. [Accessed February 8, 2008].
-
-
-
-
16
-
-
59249096146
-
-
Apr, 2007, Online, Available:, Accessed April 12, 2007
-
M. Petraschek, "Public Key Infrastructure for Mobile Devices," Apr, 2007. [Online]. Available: http://www.ftw.at/ftw/events/ telekommunikationsforum/SS2004/SS04docs/040422.ppt. [Accessed April 12, 2007].
-
Public Key Infrastructure for Mobile Devices
-
-
Petraschek, M.1
-
17
-
-
34250310194
-
Measuring QoS for GPRS Mobile Networks
-
Prague, Czech Republic, pp
-
C.M. Sarraf, et al., "Measuring QoS for GPRS Mobile Networks," in 4th WSEAS International Conference on Telecommunications and Informatics, March 13- 15, 2005, Prague, Czech Republic, pp 493-257.
-
4th WSEAS International Conference on Telecommunications and Informatics, March 13- 15, 2005
, pp. 493-257
-
-
Sarraf, C.M.1
-
18
-
-
59249107151
-
National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15
-
CNSS, June, Online
-
CNSS, "National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information," CNSS Policy No. 15, Fact Sheet No. 1, June 2003. [Online]. http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf.
-
(2003)
Fact Sheet
, Issue.1
-
-
-
20
-
-
59249091772
-
A Novel Approach to Remote Sensing and Control
-
Greece
-
R. Pandhi, et al., "A Novel Approach to Remote Sensing and Control," in 6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases, February 16-19, 2007 Corfu, Greece, 2007, pp 540-280.
-
(2007)
6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases, February 16-19, 2007 Corfu
, pp. 540-280
-
-
Pandhi, R.1
-
21
-
-
66349091137
-
Secure Mobile Electronic Card used in Medical Services
-
Istanbul, Turkey. WSEAS Press
-
C. Toma, et al., "Secure Mobile Electronic Card used in Medical Services," in Applied Computing Conference, May 27-29, 2008, Istanbul, Turkey. WSEAS Press.
-
Applied Computing Conference, May 27-29, 2008
-
-
Toma, C.1
|