Sciweavers

33 search results - page 2 / 7
» Vulnerability Analysis and Attacks on NFC-Enabled Mobile Pho...
Sort
View
ASWEC
2006
IEEE
13 years 11 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
NSDI
2008
13 years 7 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
13 years 11 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
DSN
2007
IEEE
13 years 11 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
WISTP
2010
Springer
14 years 9 days ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...