Popular posts from this blog
US 20150222631 A1
System and methods for UICC-based secure communication US 9461993 B2 System and methods for uicc-based secure communication US 20150222631 A1 ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; th...
Risk of attack coefficient effect on availability of Ad-hoc networks
Risk of attack coefficient effect on availability of Ad-hoc networks Tootaghaj , Diman Zad ; Farhat, Farshid ; Pakravan, Mohammad-Reza ; Aref, Mohammad-Reza ; Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran This paper appears in: Consumer Communications and Networking Conference (CCNC), 2011 IEEE Issue Date : 9-12 Jan. 2011 On page(s): 166 Print ISBN: 978-1-4244-8789-9 Digital Object Identifier : 10.1109/CCNC.2011.5766445 Date of Current Version : 12 May 2011 ABSTRACT Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as...
Comments