BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SMSSec: An end-to-end protocol for secure SMS

Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and integrity of the message content. This paper proposes a protocol called SMSSec that can be used to secure an SMS communication sent by Java’s Wireless Messaging API. The physi...

متن کامل

Secure Sms for End-to-end Transmission Using Protocol in Wireless Networks

The information sent from one mobile to another mobile is called as SMS (Short Message Service). This SMS service is used in many applications such as healthcare monitoring, mobile banking, mobile commerce, and so on. The information may contain account number and password, but the traditional Cellular architecture system does not provide privacy for that information. For this reason we go for ...

متن کامل

Willingness of end users to pay for e-waste recycling

BACKGROUND AND OBJECTIVES: The sheer volume of electrical and electronic waste (e-waste) has presently been generated in Vietnam, posing a growing concern regarding its impact can have on the environment and human health. Therefore, the need for developing policies and regulations towards the environmentally sound management of e-waste is becoming crucial. Although the municipa...

متن کامل

Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Nowadays, SMS is very popular mobile service and even poor, illiterate, and rural areas living people use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services but 2G services are still be used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes...

متن کامل

Secure System Virtualization: End-to-End Verification of Memory Isolation

Over the last years, security kernels have played a promising role in reshaping the landscape of platform security on today’s ubiquitous embedded devices. Security kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms. They reduce the software portion of the system’s trusted computing base to a thin layer, which enforces isolation between ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2018

ISSN: 1545-5971

DOI: 10.1109/tdsc.2018.2799223