As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...