Sciweavers

1573 search results - page 153 / 315
» Strong User Authentication
Sort
View
IEEEARES
2008
IEEE
15 years 8 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 8 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
WMCSA
2008
IEEE
15 years 8 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
APSCC
2007
IEEE
15 years 8 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
MUE
2007
IEEE
100views Multimedia» more  MUE 2007»
15 years 8 months ago
Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core Network
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...