Mobile Application Development with SMS and the Sim Toolkit
Mobile Application Development with SMS and the Sim Toolkit
Time as an Aid to Improving Security in Smart Cards
Proceedings of the IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
GSM and UMTS: The Creation of Global Mobile Communication
GSM and UMTS: The Creation of Global Mobile Communication
Smart Card Handbook
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction
Using The GSM/UMTS SIM to Secure Web Services
WMCS '05 Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
An Open Mobile Identity Tool: An Architecture for Mobile Identity Management
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
In this paper we present a methodology and protocol for establishing a security context between a Mobile Operator's application server and a GSM/UMTS SIM card. The methodology assumes that the already issued Mobile Station is capable but unprepared. The proposed scheme creates a secure entity within the Mobile Station “Over The Air” (OTA). This secure entity can then be used for subsequent SIM authentications enabling m-Commerce, DRM or web service applications. To validate our proposal we have developed a proof of concept model to install and execute the security context using readily available J2ME, Java Card, J2SE and J2EE platforms, with the KToolBar MIDP2.0 emulator tool from Sun, and a Gemplus Java Card.