메뉴 건너뛰기




Volumn , Issue , 2010, Pages 843-850

An extensible framework for efficient secure SMS

Author keywords

Elliptic curve cryptography; Mobile secure communications; Performance analysis; Power consumption analysis; SMS security

Indexed keywords

APPLICATION FIELDS; COMMUNICATION CHANNEL; CRYPTOSYSTEMS; ELLIPTIC CURVE CRYPTOGRAPHY; ENERGY CONSUMPTION; EXECUTION TIME; EXPERIMENTAL ANALYSIS; EXTENSIBLE FRAMEWORK; KEY-EXCHANGE; MOBILE MESSAGING SERVICES; PERFORMANCE ANALYSIS; PERFORMANCE ISSUES; PHONE NUMBER; PLUG-INS; POWER CONSUMPTION ANALYSIS; RSA ALGORITHMS; SECURE COMMUNICATIONS; SECURE SMS; SECURITY FEATURES; SECURITY PARAMETERS; SECURITY PROTOCOLS; SHORT MESSAGE SERVICES; SIGNATURE SCHEME; SMS MESSAGES; SMS TECHNOLOGY; SOFTWARE FRAMEWORKS;

EID: 77952715421     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISIS.2010.81     Document Type: Conference Paper
Times cited : (44)

References (24)
  • 1
    • 77952694463 scopus 로고    scopus 로고
    • online visited July 2009
    • Mobile Message Analyst, http://www.bizcommunity.com/Article/196/78/38788. html, online visited July 2009.
    • Mobile Message Analyst
  • 2
    • 77952702943 scopus 로고    scopus 로고
    • online visited July 2009
    • Tele-Log, http://www.tele-log.com/domotica-e.html, online visited July 2009.
  • 3
    • 77952712134 scopus 로고    scopus 로고
    • online visited July 2009
    • Aginova Inc., http://www.aginova.com/, online visited July 2009.
  • 4
    • 77952680281 scopus 로고    scopus 로고
    • online visited July 2009
    • Clickatell SMS API, http://www.clickatell.co.za/blog/2009/04/sms-beer- alert-you-are-in-danger-of-running-out/, online visited July 2009.
  • 5
    • 77952705452 scopus 로고    scopus 로고
    • online visited July 2009
    • Carta SI, http://www.cartasi.it/download/AM-Rimini.pdf, online visited July 2009.
  • 6
    • 70350755355 scopus 로고    scopus 로고
    • Do You Trust Your Phone?
    • EC-Web 2009: Proceedings of the 10th International Conference on E-Commerce and Web Technologies, Berlin, Heidelberg: Springer-Verlag
    • A. Castiglione, R. De Prisco, and A. De Santis, "Do You Trust Your Phone?" in EC-Web 2009: Proceedings of the 10th International Conference on E-Commerce and Web Technologies, vol. LNCS 5692. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 50-61.
    • (2009) LNCS , vol.5692 , pp. 50-61
    • Castiglione, A.1    De Prisco, R.2    De Santis, A.3
  • 9
    • 77952707508 scopus 로고    scopus 로고
    • online visited July 2009
    • IPCS Group "IPCryptSim SMS Encryption", http://www.ipcslive. com/pdf/IPCSSMS.pdf, online visited July 2009.
    • IPCryptSim SMS Encryption
  • 10
    • 55849125118 scopus 로고    scopus 로고
    • SSMS - A secure SMS messaging protocol for the m-payment systems
    • Article number 4625610,DOI: 10.1109/ISCC.2008.4625610
    • M. Toorani and A.A.B.Shirazi, "SSMS - A secure SMS messaging protocol for the m-payment systems," inProceedings - International Symposium on Computers and Communications,2008,Article number 4625610,DOI: 10.1109/ISCC.2008.4625610pp. 700-705.
    • (2008) Proceedings - International Symposium on Computers and Communications , pp. 700-705
    • Toorani, M.1    Shirazi, A.A.B.2
  • 11
    • 33746648087 scopus 로고    scopus 로고
    • An Open, PKI-Based Mobile Payment System
    • M. Hassinen, K. Hyppönen, and K. Haataja, "An Open, PKI-Based Mobile Payment System," in ETRICS, 2006, pp. 86-100.
    • (2006) ETRICS , pp. 86-100
    • Hassinen, M.1    Hyppönen, K.2    Haataja, K.3
  • 13
    • 77952717476 scopus 로고    scopus 로고
    • online visited July 2009
    • U. Chirico, http://www.ugosweb.com/miabo/, online visited July 2009.
    • Chirico, U.1
  • 15
    • 74549215783 scopus 로고    scopus 로고
    • Secure SMS messaging using Quasi-group encryption and Java SMS API
    • M. Hassinen and S. Markovski, "Secure SMS messaging using Quasi-group encryption and Java SMS API," in SPLST, 2003, pp. 187-200.
    • (2003) SPLST , pp. 187-200
    • Hassinen, M.1    Markovski, S.2
  • 17
    • 53049088300 scopus 로고    scopus 로고
    • SMSSec: An end-to-end protocol for secure SMS
    • J. L.-C. Lo, J. Bishop, and J. Eloff, "SMSSec: An end-to-end protocol for secure SMS," Computers & Security, vol. 27, no. 5-6, pp. 154-167, 2008.
    • (2008) Computers & Security , vol.27 , Issue.5-6 , pp. 154-167
    • Lo, J.L.-C.1    Bishop, J.2    Eloff, J.3
  • 18
    • 0142002511 scopus 로고    scopus 로고
    • The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. A. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int. J. Inf. Sec., vol. 1, no. 1, pp. 36-63, 2001.
    • (2001) Int. J. Inf. Sec. , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.A.3
  • 20
    • 84885891483 scopus 로고    scopus 로고
    • online visited July 2009
    • "Bouncy Castle Crypto API," http://www.bouncycastle.org/java. html, online visited July 2009.
    • Bouncy Castle Crypto API
  • 22
    • 33646382089 scopus 로고    scopus 로고
    • A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
    • N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 23
    • 33749392369 scopus 로고    scopus 로고
    • Analysis of the Power Consumption of Secure Communication in Wireless Networks
    • K. Kim, J. Hong, and J. Lim, "Analysis of the Power Consumption of Secure Communication in Wireless Networks," in DEXA, 2006, pp. 894-903.
    • (2006) DEXA , pp. 894-903
    • Kim, K.1    Hong, J.2    Lim, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.