نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :J. Electron. Commerce Res. 2002
Dan Zhu

Modern financial institutions have cashed in on the electronic business opportunities of the Internet by developing numerous payment systems to meet various payment service requirements. Advanced computer systems and telecommunications technology are being used to offer fast, convenient, and secure ways to conduct financial transactions at service and security levels that are hardly or never ac...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Ali Al Shidhani Victor C. M. Leung

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

2006
Johnnes Arreymbi

With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobile phone and other wireless device usage is increasing daily with ground breaking technological developments – in design, style, content and micro-chips performance. The contents of the multimedia packages – conversatio...

Journal: :Computer Communications 2011
Georgios Kambourakis Constantinos Kolias Stefanos Gritzalis Jong Hyuk Park

The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security when compared to 2G systems, UMTS still has weaknesses that can lead to security incidents. In this paper we investigate ...

Journal: :CoRR 2013
Nils Ulltveit-Moe Vladimir A. Oleshchuk

This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis sho...

2014
Chase Baker Michael Shin

This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...

Journal: :Ad Hoc Networks 2016
Huseyin Ugur Yildiz Kemal Bicakci Bülent Tavli Hakan Gultekin Davut Incebacak

In a typical Wireless Sensor Network (WSN) application, the basic communication service is the transportation of the data collected from sensors to the base station. For prolonging the network lifetime, energy efficiency should be one of the primary attributes of such a service. The amount of data transmitted by a node usually depends on how much local processing is performed. As an example, in...

Journal: :Symmetry 2014
Seondong Heo Soojin Lee Seokjoo Doo Hyunsoo Yoon

Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tole...

Journal: :EURASIP J. Wireless Comm. and Networking 2016
Hou Rui Zhigang Jin Baoliang Wang

Today’s Smartphone operating systems frequently fail to provide users with adequate control and visibility into how the third-party applications use their private data. With TaintDroid realized on Android system, we can detect user’s implicit taint and privacy leakage. But TaintDroid has some inherent defects. To better detect user’s implicit taint and privacy leakage in the Android platform, t...

Journal: :مطالعات و تحقیقات اجتماعی ایران 0
محمدرضا جوادی یگانه دانشگاه تهران مسعود کوثری دانشگاه تهران طاهره خیرخواه دانشگاه تهران

cell phone is now considered by its users as an entertainment and also a media in addition to serving them as a telecommunication instrument and having a cell phone has more implications for them. in this study, the author has tried to discuss these additional functions and implications through an online survey of a number of cell phone users regardless of its communicational functions  the res...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید