Sciweavers

34 search results - page 3 / 7
» Identity-Based Cryptography for Securing Mobile Phone Calls
Sort
View
CCS
2010
ACM
13 years 7 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
AC
1998
Springer
13 years 11 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
JDCTA
2010
125views more  JDCTA 2010»
13 years 2 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 7 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi