Reducing the Security Threats to 2.5G and 3G Wireless Applications

نویسندگان

  • Sunil Hattangady
  • Chris Davis
چکیده

Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform......................................................... Crypto Engine ............................................................. Security Firmware / API.............................................. Security Applications and Peripherals...................... Getting Real..................................................................... Learning From Experience ............................................. Reducing the Security Threats and 3G Wireless Applications

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

A lightweight reconfigurable security mechanism for 3G/4G mobile devices

Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data communications: the third generation of mobile telecommunications. 3G promises to converge mobile technology with Internet connectivity. Wireless data, multimedia applications, and integrated services will be among the major driving forces behind 3G. While wireless co...

متن کامل

Guest editorial: Mobility and resource management in next generation wireless systems

S ECOND GENERATION (2G) wireless systems such as Global System for Mobile communications (GSM), Personal Digital Cellular (PDC), North American Time Division Multiple Access (NA-TDMA), and Code Division Multiple Access (CDMAone) have brought mobile telephony to an impressive worldwide market. The deployment of next generation (NG) wireless systems, including 2.5G General Packet Radio Service (G...

متن کامل

Internet-draft Tcp over 2.5g and 3g Wireless Networks Internet-draft Tcp over 2.5g and 3g Wireless Networks

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...

متن کامل

The 3G-324M Protocol for Conversational Video Telephony

third-generation (3G) networks, conversational video-telephony services are becoming a key differentiator between new 3G offerings and existing 2G/2.5G services. Although it’s possible to have limited video-based services—such as a multimedia messaging service—that deliver pictures and video clips over 2.5G services, these are delay-insensitive applications that could run over a packet-based wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002