-
1
-
-
77952694463
-
-
online visited July 2009
-
Mobile Message Analyst, http://www.bizcommunity.com/Article/196/78/38788. html, online visited July 2009.
-
Mobile Message Analyst
-
-
-
2
-
-
77952702943
-
-
online visited July 2009
-
Tele-Log, http://www.tele-log.com/domotica-e.html, online visited July 2009.
-
-
-
-
3
-
-
77952712134
-
-
online visited July 2009
-
Aginova Inc., http://www.aginova.com/, online visited July 2009.
-
-
-
-
4
-
-
77952680281
-
-
online visited July 2009
-
Clickatell SMS API, http://www.clickatell.co.za/blog/2009/04/sms-beer- alert-you-are-in-danger-of-running-out/, online visited July 2009.
-
-
-
-
5
-
-
77952705452
-
-
online visited July 2009
-
Carta SI, http://www.cartasi.it/download/AM-Rimini.pdf, online visited July 2009.
-
-
-
-
6
-
-
70350755355
-
Do You Trust Your Phone?
-
EC-Web 2009: Proceedings of the 10th International Conference on E-Commerce and Web Technologies, Berlin, Heidelberg: Springer-Verlag
-
A. Castiglione, R. De Prisco, and A. De Santis, "Do You Trust Your Phone?" in EC-Web 2009: Proceedings of the 10th International Conference on E-Commerce and Web Technologies, vol. LNCS 5692. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 50-61.
-
(2009)
LNCS
, vol.5692
, pp. 50-61
-
-
Castiglione, A.1
De Prisco, R.2
De Santis, A.3
-
7
-
-
58049171471
-
A proposal for enhancing the security system of short message service in GSM
-
A. Hossain, S. Jahan, M. Hussain, M. Amin, and S. Shah Newaz, "A proposal for enhancing the security system of short message service in GSM," in Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on, Aug. 2008, pp. 235-240.
-
Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference On, Aug. 2008
, pp. 235-240
-
-
Hossain, A.1
Jahan, S.2
Hussain, M.3
Amin, M.4
Shah Newaz, S.5
-
8
-
-
64249114541
-
A PK-SIM card based end-to-end security framework for SMS
-
H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, "A PK-SIM card based end-to-end security framework for SMS," Computer Standards & Interfaces, vol. 31, no. 4, pp. 629-641, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 629-641
-
-
Rongyu, H.1
Guolei, Z.2
Chaowen, C.3
Hui, X.4
Xi, Q.5
Zheng, Q.6
-
9
-
-
77952707508
-
-
online visited July 2009
-
IPCS Group "IPCryptSim SMS Encryption", http://www.ipcslive. com/pdf/IPCSSMS.pdf, online visited July 2009.
-
IPCryptSim SMS Encryption
-
-
-
10
-
-
55849125118
-
SSMS - A secure SMS messaging protocol for the m-payment systems
-
Article number 4625610,DOI: 10.1109/ISCC.2008.4625610
-
M. Toorani and A.A.B.Shirazi, "SSMS - A secure SMS messaging protocol for the m-payment systems," inProceedings - International Symposium on Computers and Communications,2008,Article number 4625610,DOI: 10.1109/ISCC.2008.4625610pp. 700-705.
-
(2008)
Proceedings - International Symposium on Computers and Communications
, pp. 700-705
-
-
Toorani, M.1
Shirazi, A.A.B.2
-
11
-
-
33746648087
-
An Open, PKI-Based Mobile Payment System
-
M. Hassinen, K. Hyppönen, and K. Haataja, "An Open, PKI-Based Mobile Payment System," in ETRICS, 2006, pp. 86-100.
-
(2006)
ETRICS
, pp. 86-100
-
-
Hassinen, M.1
Hyppönen, K.2
Haataja, K.3
-
12
-
-
33744966592
-
SafeSMS - End-to-end encryption for SMS
-
M. Hassinen, "SafeSMS - end-to-end encryption for SMS," in Telecommunications, 2005. ConTEL 2005. Proceedings of the 8th International Conference on, vol. 2, 15-17, 2005, pp. 359-365.
-
(2005)
Telecommunications, 2005. ConTEL 2005. Proceedings of the 8th International Conference
, vol.2
, Issue.15-17
, pp. 359-365
-
-
Hassinen, M.1
-
13
-
-
77952717476
-
-
online visited July 2009
-
U. Chirico, http://www.ugosweb.com/miabo/, online visited July 2009.
-
-
-
Chirico, U.1
-
14
-
-
60349095970
-
SMS Encryption for Mobile Communication
-
D. Lisonek and M. Drahansky, "SMS Encryption for Mobile Communication," in Security Technology, 2008. SECTECH '08. International Conference on, Dec. 2008, pp. 198-201.
-
Security Technology, 2008. SECTECH '08. International Conference On, Dec. 2008
, pp. 198-201
-
-
Lisonek, D.1
Drahansky, M.2
-
15
-
-
74549215783
-
Secure SMS messaging using Quasi-group encryption and Java SMS API
-
M. Hassinen and S. Markovski, "Secure SMS messaging using Quasi-group encryption and Java SMS API," in SPLST, 2003, pp. 187-200.
-
(2003)
SPLST
, pp. 187-200
-
-
Hassinen, M.1
Markovski, S.2
-
16
-
-
60649089361
-
Transaction Oriented Text Messaging with Trusted-SMS
-
A. Grillo, A. Lentini, G. Me, and G. Italiano, "Transaction Oriented Text Messaging with Trusted-SMS," in Computer Security Applications Conference, 2008. ACSAC 2008. Annual, Dec. 2008, pp. 485-494.
-
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, Dec. 2008
, pp. 485-494
-
-
Grillo, A.1
Lentini, A.2
Me, G.3
Italiano, G.4
-
17
-
-
53049088300
-
SMSSec: An end-to-end protocol for secure SMS
-
J. L.-C. Lo, J. Bishop, and J. Eloff, "SMSSec: An end-to-end protocol for secure SMS," Computers & Security, vol. 27, no. 5-6, pp. 154-167, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.5-6
, pp. 154-167
-
-
Lo, J.L.-C.1
Bishop, J.2
Eloff, J.3
-
18
-
-
0142002511
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. A. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int. J. Inf. Sec., vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
Int. J. Inf. Sec.
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.A.3
-
20
-
-
84885891483
-
-
online visited July 2009
-
"Bouncy Castle Crypto API," http://www.bouncycastle.org/java. html, online visited July 2009.
-
Bouncy Castle Crypto API
-
-
-
22
-
-
33646382089
-
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
-
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
23
-
-
33749392369
-
Analysis of the Power Consumption of Secure Communication in Wireless Networks
-
K. Kim, J. Hong, and J. Lim, "Analysis of the Power Consumption of Secure Communication in Wireless Networks," in DEXA, 2006, pp. 894-903.
-
(2006)
DEXA
, pp. 894-903
-
-
Kim, K.1
Hong, J.2
Lim, J.3
-
24
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
IEEE Computer Society Washington, DC, USA
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society Washington, DC, USA, 2005, pp. 324-328.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
|