Popular posts from this blog
US 20150222631 A1
System and methods for UICC-based secure communication US 9461993 B2 System and methods for uicc-based secure communication US 20150222631 A1 ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; th...
Latest done by 2017
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (OCNS) Extended Authentication and Key Agreement Protocol Secure Multipath Adaptive Routing Protocol Authentication and Key Agreement Protocol in 4G Risk of attack coefficient effect on availability of adhoc networks Game-theoretic model to mitigate packet dropping Multi-dimensional correlation steganalysis SVD and Noise Estimation based Image Steganalysis Eigenvalues-based LSB steganalysis Security Weaknesses in PGP Protocol Performance Modeling and Optimization of MapReduce Image Steganalysis of Low Rate Embedding in Spatial Domain Modeling and Optimization of Straggling Mappers Blind detection of low-rate embedding Big Data Computing: Modeling and Optimization Towards Stochastically Optimizing Data Computing Flows Optimal Placement in Network On-Chip Optimal Scheduling in Parallel Programming Frameworks Node A...
Comments