Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery

R Racic, D Ma, H Chen - 2006 Securecomm and Workshops, 2006 - ieeexplore.ieee.org
As cellular data services and applications are being widely deployed, they become attractive
targets for attackers, who could exploit unique vulnerabilities in cellular networks, mobile …

SMSSec: An end-to-end protocol for secure SMS

JLC Lo, J Bishop, JHP Eloff - Computers & Security, 2008 - Elsevier
Short Message Service is usually used to transport unclassified information, but with the rise
of mobile commerce it has become an integral tool for conducting business. However, SMS …

A PK-SIM card based end-to-end security framework for SMS

H Rongyu, Z Guolei, C Chaowen, X Hui, Q Xi… - Computer Standards & …, 2009 - Elsevier
Since the first SMS (Short Message Services) message was sent in the UK in 1992, the SMS
has become a mass communication tool and has been broadly used in mobile business …

[PDF][PDF] Detection of rogue devices in wireless networks

J Hall - 2006 - repository.library.carleton.ca
The need for robust access control mechanisms is paramount, especially in Wireless Local
Area Network (WLAN) s and Wireless Wide Area Network (WWAN) s. Current authentication …

Evaluation of UMTS security architecture and services

A Bais, WT Penzhorn, P Palensky - 2006 4th IEEE International …, 2006 - ieeexplore.ieee.org
This paper presents an in-depth analysis and evaluation of the security of UMTS. Four
classes of attacks and threats are discussed in detail. Thereafter, the available security …

[PDF][PDF] Security aspects of ubiquitous computing in health care

E Weippl, A Holzinger, AM Tjoa - Elektrotechnik und …, 2006 - graz.elsevierpure.com
Today, ubiquitous devices lack many of the security features known in desktop computing,
an industry that is known to have a plethora of security problems. As ubiquitous devices are …

Authentication and Billing Protocols for the Integration of WLAN and 3G Networks

YM Tseng, CC Yang, JH Su - Wireless Personal Communications, 2004 - Springer
Wireless communications have developed rapidly and have been applied for many services.
Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are …

[PDF][PDF] FPGA Implementation of High-Performance s-box Model and Bit-level Masking for AES Cryptosystem

BM Krishna, C Santhosh, SK Khasimbee - IJEER, 2022 - ijeer.forexjournal.co.in
The inadequacies inherent in the existing cryptosystem have driven the development of
exploit the benefits of cipher key characteristics and associated key generation tasks in …

A secure SMS protocol for implementing digital cash system

NR Kisore, S Sagi - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
We propose a digital cash system suitable for low value transactions and a secure SMS
protocol based on EC-MQV key agreement protocol and AES encryption algorithm to …

Early feature stream integration versus decision level combination in a multiple classifier system for text line recognition

R Bertolami, H Bunke - 18th International Conference on …, 2006 - ieeexplore.ieee.org
This paper compares two different methods to combine feature streams to improve the
performance of offline handwritten text line recognition systems. In both methods a pixel …