Sciweavers

256 search results - page 2 / 52
» Security protocols for 2G and 3G wireless communications
Sort
View
CCS
2001
ACM
13 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 4 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ISSA
2008
13 years 6 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
WS
2004
ACM
13 years 10 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 4 months ago
Multi-standard programmable baseband modulator for next generation wireless communication
Considerable research has taken place in recent times in the area of parameterization of software defined radio (SDR) architecture. Parameterization decreases the size of the soft...
Indranil Hatai, Indrajit Chakrabarti