The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, it first analyzes the present security protocol for mobile communications. Furthermore, a security framework for the Mobile E-Service is proposed. In the mean time, using the inherent security and expansibility of J2ME, we design a security message flow model to support communication protocol for the Mobile E-Service Oriented Architecture (MSOA), which emphasizes the authentication...
An overview of the EAP-based handover procedures of the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in IEEE 802.16e networks that guarantee a backward and forward secrecy are described and formally verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in the...
Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel protocol by cooperation between two kinds of agents - task agent who transfers freely in the net and secondary agent who transfers passively...
In this paper, we propose a security protocol compiler that automatically generates security protocol modules based on a security protocol definition. Our security compiler loads a security protocol definition file that can be defined as a high-level specification of the protocol written in XML and it generates a C source code from the specification. Our security protocol compiler realizes fast C...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.