Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Smart Card Handbook
Secure architecture for the digital rights management of the m-content
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Schedule risk management for business M-applications development projects
WSEAS Transactions on Computers
Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Structures used in secure automatic ticketing system
WSEAS Transactions on Computers
Hi-index | 0.00 |
The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the solution for avoiding denial of service from WAP applications using WIM features. The first section contains the structure of GSM network from voice and data point of view. The security in GSM network is presented in second section. The third section presents a solution for realizing mobile subscriber non-repudiation. The solution is based on the HTTP protocol over WAP.