BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users
نویسندگان
چکیده
منابع مشابه
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and integrity of the message content. This paper proposes a protocol called SMSSec that can be used to secure an SMS communication sent by Java’s Wireless Messaging API. The physi...
متن کاملSecure Sms for End-to-end Transmission Using Protocol in Wireless Networks
The information sent from one mobile to another mobile is called as SMS (Short Message Service). This SMS service is used in many applications such as healthcare monitoring, mobile banking, mobile commerce, and so on. The information may contain account number and password, but the traditional Cellular architecture system does not provide privacy for that information. For this reason we go for ...
متن کاملWillingness of end users to pay for e-waste recycling
BACKGROUND AND OBJECTIVES: The sheer volume of electrical and electronic waste (e-waste) has presently been generated in Vietnam, posing a growing concern regarding its impact can have on the environment and human health. Therefore, the need for developing policies and regulations towards the environmentally sound management of e-waste is becoming crucial. Although the municipa...
متن کاملProposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Nowadays, SMS is very popular mobile service and even poor, illiterate, and rural areas living people use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services but 2G services are still be used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes...
متن کاملSecure System Virtualization: End-to-End Verification of Memory Isolation
Over the last years, security kernels have played a promising role in reshaping the landscape of platform security on today’s ubiquitous embedded devices. Security kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms. They reduce the software portion of the system’s trusted computing base to a thin layer, which enforces isolation between ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2018
ISSN: 1545-5971
DOI: 10.1109/tdsc.2018.2799223