A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A proposed architecture for secure two-party mobile payment
2009
2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
In this paper we propose a new secured architecture for two-party mobile payments, e.g. mobile banking. ...
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. ...
In this paper we propose a a new secured architecture for mobile banking/payments. ...
doi:10.1109/pacrim.2009.5291393
fatcat:iukuwz7uqrgu3mack4fy3fuoom
A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems
2005
IEEE Communications Magazine
Architecture for Next-Generation Wireless Systems Architectures requiring direct SLAs among different providers are not feasible because of the reasons mentioned earlier. ...
The working principle of this third-party-based security architecture is as follows. ...
doi:10.1109/mcom.2005.1452832
fatcat:qv3o5ttmpzai5l5pfqpxx4ixky
Issues toward Networks Architecture Security for LTE and LTE-A Networks
2014
International Journal of Security and Its Applications
Second, LTE security architecture is shown as well. Third, some drawbacks in LTE security framework are discussed in Section 4. ...
The Long Term Evolution (LTE) system has been specified by the Third Generation Partnership Project (3GPP) on the way towards fourth-generation (4G) mobile to ensure 3GPP keeping the dominance of the cellular ...
Acknowledgments This paper is a revised and expanded version of a paper entitled "A Survey about Location-Based Routing Protocols for Wireless Sensor Network" presented at CIA 2014, Angeles City (Clark ...
doi:10.14257/ijsia.2014.8.4.02
fatcat:y4rm4gpvdjhifkwp4hn5lqu5na
Building robust m-commerce payment system on offline wireless network
2011
2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS)
The proposed system highlights a novel approach for building a secure, scalable, and flexible e-payment systems in the distributed scenario of wireless adhoc network in offline mode of communication for ...
The proposed system uses Simple Public Key Infrastructure for providing the security in payment processes. ...
The proposed system highlights a very flexible architecture for secure transaction in wireless mobile adhoc network. ...
doi:10.1109/ants.2011.6163664
dblp:conf/IEEEants/NK11
fatcat:nkksfx2vhfauhpfotzcyxmjsoy
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis
2008
Computer Communications
In this article, first we study the design of intelligent services in wireless fourth generation networks. ...
Wireless 4G network should offer a wide use of information processing techniques, efficient manipulation of the network resources, and reuse of network functions. ...
A very high-data rate is required to realize this and this data rate is well beyond the capability of the third generation (3G) wireless systems. ...
doi:10.1016/j.comcom.2008.05.003
fatcat:cmoufxw3qfhfbjj3eie5vdwuie
A Novel Privacy Preservation Schemes in Wireless Network
2017
International Journal of Advanced Research in Computer Science and Software Engineering
As the time two tier wireless sensor network have some advantages related to the security that is the major concern in the two tier architecture. ...
There is an some fundamental architectures that one from compromising a sensor and server and another is to compromising a sensor, server and a storage capacity nodes between the two tier architecture ...
SYSTEM ARCHITECTURE AND DESIGN GOALS This section can describes the system architecture and major design goals of the paper
A. ...
doi:10.23956/ijarcsse/v7i4/0112
fatcat:guz45kwrhnf57lxelo7woce2gi
Guest Editorial Recent Advances in Managing Enterprise Network Services
2005
IEEE Journal on Selected Areas in Communications
The third paper, "Service Management in Secure and QoS-Aware Wireless Enterprise Networks," brings the perspective of managing network services in a wireless environment that is becoming more and more ...
The third paper in this category, "Quanta Data Storage: An Information Processing and Transportation Architecture for Storage Area Networks," presents a new architecture for storage area networks that ...
doi:10.1109/jsac.2005.854117
fatcat:spxlfeu7drfhfmp3patkb2cwqi
A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks
2015
International Journal of Computer Applications
Wireless networking protocols square measure progressively being designed to use a user's measured channel condition. ...
Every user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to see however resources square measure allotted to users. ...
The scheduler-based attacks in third generation wireless networks are used for measures the quality and performance of the downlink channels in a network. ...
doi:10.5120/19170-0640
fatcat:wdfu3qjgarb7bhsfskqjhawna4
Wireless Communication: Evolution and Advance Wireless Communication
2018
International Journal of Sustainable Development Research
As this paper represent the Generation of the wireless communication, the network architecture of wireless communication and the hardware and software logics evolution of the wireless communication, Network ...
There is a evolution take place in order to get the advance technology in the wireless communication (1G to 5G). ...
Third Generation Systems (3G) Third generation (3G) services combine high speed mobile access with Internet Protocol (IP)-based services. ...
doi:10.11648/j.ijsdr.20180402.12
fatcat:lvgo7oomaffzfmcpd4inukn36m
Some Security Issues of Wireless Systems
[chapter]
2005
Lecture Notes in Computer Science
These systems appear under a variety of architectures including fixed networks, cellular networks, and ad hoc networks. ...
To this we add the fact that there is a large variety of devices using different architectures, several operating systems, and diverse functionality. ...
Acknowledgements This work was supported by a grant from the Defense Information Systems Agency (DISA), administered by Pragmatics, Inc. ...
doi:10.1007/11533962_35
fatcat:423qp3mqsncrxa74qdjenolige
Security for QoS assured wireless and mobile networks
2010
Security and Communication Networks
The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture for WMNs, proposes a fully distributed ...
Whilst the wireless mesh architecture addressed in the first paper is general, in the second manuscript on Differentiated Security in WMNs, the authors target the design of secure mechanisms for IEEE 802.11s-based ...
The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture for WMNs, proposes a fully distributed ...
doi:10.1002/sec.201
fatcat:nlt4di4iv5e43izj4nnty4f7bq
AN OVERVIEW OF THE ATTACKS ON LTE IN 4G: EXPLOITING THE SECURITY
2017
International Journal of Advanced Research in Computer Science
Communication in wireless provides a number of applications. Wireless communications have grown from last ten decades. ...
In this paper we have studied various security threats on LTE system and their analysis and comparison to overcome these attacks has been done. ...
II. 3GPP LTE SECURITY It is a standard form used for wireless communication. ...
doi:10.26483/ijarcs.v8i9.5150
fatcat:ocuva26jijfxxdaf7w7cuq4sim
Conveying IN into an All-IP network's service architecture
2000
Proceedings 2000 IEEE Intelligent Network Workshop
networks resulting in a need for efficient network design. ...
Widespread wireless technologies, increasing variety of user-friendly and multimedia-enabled terminals and wider availability of open source tools for content generation has lead encouraged user-centric ...
The 5 th generation of mobile wireless network will be a extremely amazing communication system with no restraint. ...
doi:10.1109/inw.2000.868195
fatcat:slfpydctvbf3famafbope7lquq
Conceptualizing a Secure Wireless Cloud
2012
International Journal of Cloud Computing and Services Science (IJ-CLOSER)
We will identify a wireless cloud architecture, potential vulnerabilities and threats to a wireless cloud solution, and propose the beginnings of a wireless grid security architecture, which focuses on ...
As a new paradigm for organizational strategic initiatives, these are the issues which prevent cloud computing and wireless grid solutions from becoming the prevalent integration for an operational system ...
ACKNOWLEDGEMENTS The development of the Wireless Grid Innovation Testbed (WiGiT) is primarily funded by the support of the National Science Foundation (NSF) Partnership for Innovation (PFI) program grants ...
doi:10.11591/closer.v1i3.790
fatcat:hqlgnmrmwnanfl53kcsbxoarpy
Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks
2015
International Journal of Computer Applications
The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. ...
The proposed model will use a pre-shared key group to ensure the security during the call setup phase and will use the random table based non-predictive key exchange model for the purpose of in-call security ...
These limitations and disadvantages have generated the need for a universal framework encompassing all wired systems without existing heterogeneous wireless in use. ...
doi:10.5120/20884-3644
fatcat:hfhn2rs3r5bbhgqp5iwln2m7lm
« Previous
Showing results 1 — 15 out of 47,013 results