The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
4G networks to utilize Voice over LTE (VoLTE). VoLTE uses similar authentication mechanisms such as HTTP. It is therefore possible that a web client on the mobile device will use for authentication mechanism originally designed for the VoLTE [10]. I.e. to use the AKA mechanism, which uses the UICC (USIM / ISIM). This mechanism authenticates the user to the mobile network. However, Web applications...
Mobile payments are a natural evolution of e-payment schemes that will facilitate mobile commerce. A mobile payment or m-payment may be defined, as any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial value in return for goods and services. Mobile devices may include mobile phones, PDAs, wireless tablets and any other device that connect to mobile telecommunication...
The anonymity, mutual authentication and low computation cost are the three important requirements for authentication of global mobility networks (GLOMONETs). Based on these three requirements, many authentication schemes have been proposed. In [9], an enhanced authentication scheme called Enhanced Authentication with Anonymity for Roaming Service (EAARS) has been proposed and it is claimed that the...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce security model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method...
Mobile phones have become essential part of everybodypsilas daily life. Efforts have been made to add more features into the mobile devices. Contact less payment is another dimension that adds value to mobile phones. In contact less payment through mobile device, user is able to pay using his mobile device without touching or swiping card on a reading device. In this paper, we present an idea to equip...
The Near Field Communication technology is currently leveraged by large standardization efforts and attempts at iquestnding suitable ecosystem and business models. In this context, the GlobalPlatform consortium released requirements to allow multiple actors to manage card content coniquestdentially; and to adapt the platform to the Universal Integrated Circuit Card (UICC) in what is referred to as...
The mobile network operators (MNOs) would like to ensure the high level of security of their services to their customers without any inefficiency and protect their own business models from any adversary. However, due to the constraints of the mobile handsets, the dreams had seemed to be difficult to be realized till now. As the 3G mobile network has spread out widely and the technologies of smart...
Proposes an integrated security framework based on the security demands of business applications on mobile network. Features of the framework includes: (1) supports various mobile communication protocols, and can automatically switch to the most appropriate security channel in according with link status and user demands, (2) provides multi-element authentication mechanism to reduce the risk of terminal...
Identity management is one of the major challenges on the Internet today, mainly due to the ever increasing number of services provided and at the same time an increasing amount of fraudulent service usage. As service access is becoming more and more ubiquitous, and services are used in distributed mobile environments, the challenges are growing even more, because the different points of access can...
In this paper we investigate the problem of the growing amount of personal content available online and the privacy problems associated with this area. Different levels of security requirements and possible solutions are shown. Finally, we propose a smartcard based right management solution, which is using the SIM of a mobile phone as trusted entity.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.