-
1
-
-
77954808901
-
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
-
Abomhara M, Khalifa O, Zakaria O, Zaidan A, Zaidan B, Alanazi H (2010). Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. J. Appl. Sci., 10: 1656-1661.
-
(2010)
J. Appl. Sci
, vol.10
, pp. 1656-1661
-
-
Abomhara, M.1
Khalifa, O.2
Zakaria, O.3
Zaidan, A.4
Zaidan, B.5
Alanazi, H.6
-
2
-
-
78650590292
-
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
-
Al-bakri S, Kiah M (2010). A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Sci. Res. Essays., 5: 3455-3466.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 3455-3466
-
-
Al-Bakri, S.1
Kiah, M.2
-
4
-
-
78049468900
-
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
-
Alanazi H, Jalab H, Alam G, Zaidan B, Zaidan A (2010). Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
-
(2010)
J. Med. Plants Res
, vol.4
, pp. 2059-2074
-
-
Alanazi, H.1
Jalab, H.2
Alam, G.3
Zaidan, B.4
Zaidan, A.5
-
5
-
-
79957461639
-
Secure topology for electronic medical record transmissions
-
Alanizi H, Kiah M, Zaidan A, Alam G (2010). Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
-
(2010)
Int. J. Pharmacol
, vol.6
, pp. 954-958
-
-
Alanizi, H.1
Kiah, M.2
Zaidan, A.3
Alam, G.4
-
6
-
-
59249085781
-
GSM mobile SMS/MMS using public key infrastructure: M-PKI
-
Anuar NB, Kuen LN, Zakaria O, Gani A, Wahab AWA (2008). GSM mobile SMS/MMS using public key infrastructure: m-PKI. WSEAS Trans. Comput., 7: 1219-1229.
-
(2008)
WSEAS Trans. Comput
, vol.7
, pp. 1219-1229
-
-
Anuar, N.B.1
Kuen, L.N.2
Zakaria, O.3
Gani, A.4
Wahab, A.W.A.5
-
8
-
-
79957650659
-
-
Case TELKOM FLEXI
-
Asvial M, Sirat D, Susatyo B (2008). Design and Analysis of Anti Spamming SMS to Prevent Criminal Deception and Billing Froud: Case TELKOM FLEXI.
-
(2008)
Susatyo B
-
-
Asvial, M.1
Sirat, D.2
-
9
-
-
46149101202
-
Payments through Mobile Phone. Emerging Technologies
-
Aziz Q (2006). Payments through Mobile Phone. Emerging Technologies, 2006. ICET '06. International Conference on. pp. 50-52.
-
(2006)
ICET '06. International Conference On
, pp. 50-52
-
-
Aziz, Q.1
-
12
-
-
79957667968
-
-
Real Time Cryptanalysis of A5/1 on a PC
-
Biryukov A, Shamir A, Wagner D (2001). Real Time Cryptanalysis of A5/1 on a PC. pp. 37-44.
-
(2001)
, pp. 37-44
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
13
-
-
0036806184
-
-
Boman K, Horn G, Howard P, Niemi V (2002). UMTS security. Elect. Commun. Eng. J., 14: 191-204.
-
(2002)
UMTS Security. Elect. Commun. Eng. J
, vol.14
, pp. 191-204
-
-
Boman, K.1
Horn, G.2
Howard, P.3
Niemi, V.4
-
15
-
-
33746248681
-
Design and implementation of a PKIbased end-to-end secure infrastructure for mobile E-Commerce
-
Chanson ST, Cheung TW (2001). Design and implementation of a PKIbased end-to-end secure infrastructure for mobile E-Commerce. World Wide Web. 4: 235-253.
-
(2001)
World Wide Web
, vol.4
, pp. 235-253
-
-
Chanson, S.T.1
Cheung, T.W.2
-
16
-
-
79957664396
-
-
University of Cape Town, South Africa, Tech. Rep., Nov. 1:
-
Chikomo K, Chong MK, Arnab A, Hutchison A (2006). Security of mobile banking. University of Cape Town, South Africa, Tech. Rep., Nov. 1:
-
(2006)
Security of Mobile Banking
-
-
Chikomo, K.1
Chong, M.K.2
Arnab, A.3
Hutchison, A.4
-
18
-
-
0036805551
-
Public key infrastructure in mobile systems
-
Dankers J, Garefalakis T, Schaffelhofer R, Wright T (2002). Public key infrastructure in mobile systems. Elect. Communi. Eng. J., 14:180-190.
-
(2002)
Elect. Communi. Eng. J
, vol.14
, pp. 180-190
-
-
Dankers, J.1
Garefalakis, T.2
Schaffelhofer, R.3
Wright, T.4
-
19
-
-
77953740422
-
-
De Paula R, Ding X, Dourish P, Nies K, Pillet B, Redmiles D, Ren J, Rode J (2005). Two experiences designing for effective security. p. 34.
-
(2005)
Two Experiences Designing For Effective Security
, pp. 34
-
-
de Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
-
23
-
-
67650066992
-
A State of Security for SMS on Mobile Devices, Electronics, Robotics and Automotive Mechanics Conference
-
Garza-Saldana JJ, Daz-Pérez A (2008). A State of Security for SMS on Mobile Devices, Electronics, Robotics and Automotive Mechanics Conference, CERMA '08. 4(5):110-115.
-
(2008)
CERMA '08
, vol.4
, Issue.5
, pp. 110-115
-
-
Garza-Saldana, J.J.1
Daz-Pérez, A.2
-
24
-
-
0031165261
-
Use of SS7 in D-AMPS-based PCS: Orthodoxy vs. heterodoxy
-
Glitho RH (1997). Use of SS7 in D-AMPS-based PCS: orthodoxy vs. heterodoxy. Personal Commun. IEEE., 4: 15-23.
-
(1997)
Personal Commun. IEEE
, vol.4
, pp. 15-23
-
-
Glitho, R.H.1
-
25
-
-
0036766702
-
Real-time interception systems for the GSM protocol
-
Gonzalez-Castano FJ, Vales-Alonso J, Pousada-Carballo JM, de Vicente FI, Fernandez-Iglesias MJ (2002). Real-time interception systems for the GSM protocol. IEEE Trans. Vehicular Technol., 51: 904-914.
-
(2002)
IEEE Trans. Vehicular Technol
, vol.51
, pp. 904-914
-
-
Gonzalez-Castano, F.J.1
Vales-Alonso, J.2
Pousada-Carballo, J.M.3
de Vicente, F.I.4
Fernandez-Iglesias, M.J.5
-
28
-
-
1342302574
-
Simplifying public key management
-
Gutmann P (2004). Simplifying public key management. Comput., 37: 101-103.
-
(2004)
Comput
, vol.37
, pp. 101-103
-
-
Gutmann, P.1
-
35
-
-
58049171471
-
-
Hossain M, Jahan A, Hussain S, Amin MM, Newaz MR, Shah SH (2008). A proposal for enhancing the security system of short message service in GSM. pp. 235-240.
-
(2008)
A Proposal For Enhancing the Security System of Short Message Service In GSM
, pp. 235-240
-
-
Hossain, M.1
Jahan, A.2
Hussain, S.3
Amin, M.M.4
Newaz, M.R.5
Shah, S.H.6
-
36
-
-
33748598990
-
An efficient identity-based cryptosystem for end-to-end mobile security
-
Hwu JS, Chen RJ, Lin YB (2006). An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Trans Wireless Commun., 5: 2586.
-
(2006)
IEEE Trans Wireless Commun
, vol.5
, pp. 2586
-
-
Hwu, J.S.1
Chen, R.J.2
Lin, Y.B.3
-
38
-
-
76549088474
-
Developing and implementing encryption algorithm for addressing GSM security issues.Emerging Technologies
-
Islam S, Ajmal F (2009). Developing and implementing encryption algorithm for addressing GSM security issues.Emerging Technologies, 2009. ICET 2009. International Conference. pp. 358-361.
-
(2009)
ICET 2009. International Conference
, pp. 358-361
-
-
Islam, S.1
Ajmal, F.2
-
39
-
-
80052788393
-
-
Usability and privacy in identity management architectures
-
Jøsang A, Zomai MA, Suriadi S (2007). Usability and privacy in identity management architectures. p. 152.
-
(2007)
, pp. 152
-
-
Jøsang, A.1
Zomai, M.A.2
Suriadi, S.3
-
40
-
-
59249085781
-
GSM Mobile SMS/MMS using Public Key Infrastructure: M-PKI
-
Jumaat NB, Zakaria O, Gani A (2008). GSM Mobile SMS/MMS using Public Key Infrastructure: M-PKI. WSEAS Trans. Comput., 7: 1219-1229.
-
(2008)
WSEAS Trans. Comput.
, vol.7
, pp. 1219-1229
-
-
Jumaat, N.B.1
Zakaria, O.2
Gani, A.3
-
42
-
-
0037710621
-
Study of Management on the Mobile Public Key Infrastructure
-
Kawamoto K, Nakamura N (2002). Study of Management on the Mobile Public Key Infrastructure. NOMS2002, Apr, pp. 955-957.
-
(2002)
NOMS2002, Apr
, pp. 955-957
-
-
Kawamoto, K.1
Nakamura, N.2
-
43
-
-
0242527195
-
Security aspects of 3G-WLAN interworking
-
Koien GM, Haslestad T (2003). Security aspects of 3G-WLAN interworking. Commun. Mag. IEEE, 41: 82-88.
-
(2003)
Commun. Mag. IEEE
, vol.41
, pp. 82-88
-
-
Koien, G.M.1
Haslestad, T.2
-
46
-
-
0141569860
-
Lightweight security for mobile commerce transactions
-
Lam KY, Chung SL, Gu M, Sun JG (2003). Lightweight security for mobile commerce transactions. Comput. Commun., 26: 2052-2060.
-
(2003)
Comput. Commun
, vol.26
, pp. 2052-2060
-
-
Lam, K.Y.1
Chung, S.L.2
Gu, M.3
Sun, J.G.4
-
48
-
-
33846630288
-
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
-
Lee Y, Lee J, Song JS (2007). Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Comput. Commun., 30: 893-903.
-
(2007)
Comput. Commun
, vol.30
, pp. 893-903
-
-
Lee, Y.1
Lee, J.2
Song, J.S.3
-
58
-
-
11244336964
-
On the impact of GSM encryption and manin-the-middle attacks on the security of interoperating GSM/UMTS networks. Personal, Indoor and Mobile Radio Communications
-
Meyer U, Wetzel S (2004b). On the impact of GSM encryption and manin-the-middle attacks on the security of interoperating GSM/UMTS networks. Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE Int. Symposium on. 4: 2876-2883.
-
(2004)
PIMRC 2004. 15th IEEE Int. Symposium On
, vol.4
, pp. 2876-2883
-
-
Meyer, U.1
Wetzel, S.2
-
59
-
-
0036976502
-
-
Moore T, Kosloff T, Keller J, Manes G, Shenoi S (2002). Signaling system 7 (SS7) network security, 2(3): 496-499.
-
(2002)
Signaling System 7 (SS7) Network Security
, vol.2
, Issue.3
, pp. 496-499
-
-
Moore, T.1
Kosloff, T.2
Keller, J.3
Manes, G.4
Shenoi, S.5
-
60
-
-
13444263534
-
The value of mobile applications: A utility company study
-
Nah FFH, Siau K, Sheng H (2005). The value of mobile applications: a utility company study. Commun. ACM, 48:90.
-
(2005)
Commun. ACM
, vol.48
, pp. 90
-
-
Nah, F.F.H.1
Siau, K.2
Sheng, H.3
-
62
-
-
33745926210
-
Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
-
Nicholson A, Smith I, Hughes J, Noble B (2006). Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. Pervasive Computing. pp. 202-219.
-
(2006)
Pervasive Computing
, pp. 202-219
-
-
Nicholson, A.1
Smith, I.2
Hughes, J.3
Noble, B.4
-
63
-
-
0010385996
-
-
Helsinki University of technology, Lauri. Pesonen@ iki. Fi
-
Pesonen L (1999). Gsm interception. lecture notes, Helsinki University of technology, Lauri. Pesonen@ iki. Fi, pp. 1-9.
-
(1999)
Gsm Interception. Lecture Notes
, pp. 1-9
-
-
Pesonen, L.1
-
67
-
-
16444376120
-
Two-factor authentication: Too little, too late
-
Schneier B. (2005). Two-factor authentication: too little, too late. Communications of the ACM. 48: 136.
-
(2005)
Communications of the ACM
, vol.48
, pp. 136
-
-
Schneier, B.1
-
69
-
-
79957638731
-
Analysis of payment transaction security in mobile commerce.Information Reuse and Integration, 2004
-
IRI 2004
-
Seema N, Lu CT, Liang LR (2004). Analysis of payment transaction security in mobile commerce.Information Reuse and Integration, 2004. IRI 2004. Proceedings of the 2004 IEEE Int. Conf. pp. 475-480.
-
(2004)
Proceedings of the 2004 IEEE Int. Conf
, pp. 475-480
-
-
Seema, N.1
Lu, C.T.2
Liang, L.R.3
-
72
-
-
79952053382
-
Mobile SMS Banking Security Using Elliptic Curve Cryptosystem
-
Soram R (2009). Mobile SMS Banking Security Using Elliptic Curve Cryptosystem. IJCSNS. 9: 30.
-
(2009)
IJCSNS
, vol.9
, pp. 30
-
-
Soram, R.1
-
74
-
-
62349084872
-
-
Tiejun P, Leina Z, Chengbin F, Wenji H, Leilei F (2008). M-commerce Security Solution Based on the 3rd Generation Mobile Communication, pp. 364-367.
-
(2008)
M-commerce Security Solution Based On the 3rd Generation Mobile Communication
, pp. 364-367
-
-
Tiejun, P.1
Leina, Z.2
Chengbin, F.3
Wenji, H.4
Leilei, F.5
-
76
-
-
63249087404
-
Solutions to the GSM Security Weaknesses.Next Generation Mobile Applications, Services and Technologies, 2008
-
Toorani M, Beheshti SAA (2008). Solutions to the GSM Security Weaknesses.Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST '08. The Second International Conference on. pp. 576-581.
-
(2008)
NGMAST '08. the Second International Conference On
, pp. 576-581
-
-
Toorani, M.1
Beheshti, S.A.A.2
-
77
-
-
62949166612
-
-
LPKI-a Lightweight Public Key Infrastructure for the mobile environment, 162-166
-
Toorani M, Shirazi B, Asghar A (2008). LPKI-a Lightweight Public Key Infrastructure for the mobile environments. pp. 162-166.
-
(2008)
-
-
Toorani, M.1
Shirazi, B.2
Asghar, A.3
-
78
-
-
79957654316
-
-
Xml security based access control for healthcare information in mobile environmen
-
Weerasinghe D, Elmufti K, Rajarajan M, Rakocevic V (2006). Xml security based access control for healthcare information in mobile environment. pp. 1-6.
-
(2006)
, pp. 1-6
-
-
Weerasinghe, D.1
Elmufti, K.2
Rajarajan, M.3
Rakocevic, V.4
-
79
-
-
0026852968
-
Signaling System No.7, IS-41 and cellular telephony networking
-
Wilson DR (1992). Signaling System No.7, IS-41 and cellular telephony networking. Proceed. IEEE, 80: 644-652.
-
(1992)
Proceed. IEEE
, vol.80
, pp. 644-652
-
-
Wilson, D.R.1
-
80
-
-
79957634515
-
The importance of PKI today
-
Wilson S (2005). The importance of PKI today. China Communications. p. 15.
-
(2005)
China Communications
, pp. 15
-
-
Wilson, S.1
-
82
-
-
79957646860
-
Eighth International Conference on Embedded Computing
-
Research on NTRU Algorithm for Mobile Java Security.Scalable Computing and Communications
-
Xiaoyu S, Zhenjun D, Rong C (2009). Research on NTRU Algorithm for Mobile Java Security.Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. Int. Conf. pp. 366-369.
-
(2009)
SCALCOM-EMBEDDEDCOM'09. Int. Conf
, pp. 366-369
-
-
Xiaoyu, S.1
Zhenjun, D.2
Rong, C.3
-
84
-
-
79957664504
-
-
Building Secure User-to-user Messaging in Mobile Telecommunication Networks
-
Zhao S, Aggarwal A, Liu S (2008). Building Secure User-to-user Messaging in Mobile Telecommunication Networks. pp. 24-26.
-
(2008)
, pp. 24-26
-
-
Zhao, S.1
Aggarwal, A.2
Liu, S.3
-
85
-
-
79957662659
-
-
An authentication and security protocol for mobile computing
-
Zheng Y (1996). An authentication and security protocol for mobile computing. pp. 249-257.
-
(1996)
, pp. 249-257
-
-
Zheng, Y.1
|