The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose the wireless shopping scheme, called the Secure Mobile Shopping System (SMoSS for short), which is a secure and convenient wireless shopping environment, and in which we can safely create and perform our credit-card transaction by coordinating the cash flow of a trading system and credit card entities, without requiring additional restrictions and resources on the cash flow...
In this paper, we propose a novel security scheme, called the security system with RSA and Diffie-Hellman algorithms for a 4G environment (Se4GE for short), which as an LTE-based system integrates the RSA and Diffie-Hellman algorithms to solve some of the security drawbacks of current 4G broadband wireless transmission. The Se4GE is an end-to-end ciphertext transfer mechanism which dynamically changes...
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current wireless communication systems. But when its HSS authenticates UEs, the random number RAND generated by HSS for creating other keys during its delivery from HSS to UE is unencrypted. Also, many parameters are generated by invoking a function with only one input key, thus very easily to be cracked. So in this paper,...
In this paper, we propose a new symmetric key exchange system, named the Wireless Security System with Data Connection Core (WiSDC for short), which can not only verify whether a user is a legitimate one or not, but also produce internally used parameters, named internal keys, and speed up the key exchange process for a wireless session as well. Moreover, the WiSDC adopts a pseudo random number generator,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.