نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :Information Systems Frontiers 2009
Jorge Guajardo Boris Skoric Pim Tuyls Sandeep S. Kumar Thijs Bel Antoon H. M. Blom Geert Jan Schrijen

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID syst...

Journal: :IACR Cryptology ePrint Archive 2012
Aurélien Francillon Quan Nguyen Kasper Bonne Rasmussen Gene Tsudik

Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from critical infrastructures to home entertainment. Despite their specialized nature as well as limited resources and connectivity, these devices are now becoming increasingly pop...

2014
Dingna Tang Yimin Yang Ying Yan Ming Zhou

With the improvement of telecommunication and wireless Internet-access technologies, smart mobile terminals have been extensively applied for mobile shopping. In this paper, PPM Model is taken as a theoretical framework and an empirical research method is employed to determine the antecedents influencing consumers’ decisions on migrating from PC-based shopping to mobile shopping. We found that ...

Journal: :I. J. Network Security 2009
Thomas Chardin Raphaël Marinier

This paper analyzes the Improved Cellular Message Encryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm (CMEA). We present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements made over CMEA are ineffective to thwart s...

2011
Mudassar Aslam Christian Gehrmann

In this report, we describe mechanisms for platforms looking into a telecommunication cloud architecture we present focuses scenario we present. This report security mechanisms and protocols, leveraging existing standards and s applicable. In particular, our architecture uses TCG technologies for trust establishment in the deployment of operator virtual machines on shared resource platforms. We...

2003
Krzysztof Pawlikowski

Since the birth of ARPANET and the first commercial applications of computer networks, through explosion of popularity of the Internet and wireless communications, we have witnessed increasing dependence of our civilization on information services of telecommunication networks. Their efficiency and reliability have become critically important for the well-being and prosperity of societies as we...

1996
Andreas Fasbender Dogan Kesdogan Olaf Kubitz

in: 4th International Conference on Telecommunication Systems, Modelling and Analysis, März 21 24, 1996, Nashville, TN, USA Analysis of Security and Privacy in Mobile IP Andreas Fasbender, Dogan Kesdogan 1 and Olaf Kubitz Lehrstuhl für Informatik 4 (Communication Systems) RWTH Aachen (Aachen University of Technology) 52056 Aachen, Germany Phone: +49 (241) 80-21401, Fax: +49 (241) 8888-220 E-mai...

Journal: :IACR Cryptology ePrint Archive 2008
Thomas Chardin Raphaël Marinier

This paper analyzes the Improved Cellular Message Encryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm (CMEA). We present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements made over CMEA are ineffective to thwart s...

Journal: :EURASIP J. Information Security 2007
Zekeriya Erkin Alessandro Piva Stefan Katzenbeisser Reginald L. Lagendijk Jamshid Shokrollahi Gregory Neven Mauro Barni

1 Electrical Engineering, Mathematics, and Computer Science Faculty, Delft University of Technology, 2628 CD, Delft, The Netherlands 2Department of Electronics and Telecommunication, University of Florence, 50139 Florence, Italy 3 Information and System Security Group, Philips Research Europe, 5656 AE, Eindhoven, The Netherlands 4Department of Electrical Engineering and Information Sciences, Ru...

2015
Christos Xenakis

The universal mobile telecommunication system (UMTS) (3rd Generation Partnership Project [3GPP] TS 23.002, 2002) is a realization of third generation (3G) networks, which intend to establish a single integrated system that supports a wide spectrum of operating environments. Users have seamless access to a wide range of new telecommunication services, such as high data rate transmission for high...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید