A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automatic Test Generation on a (U)SIM Smart Card
[chapter]
2006
Lecture Notes in Computer Science
Then, we suggest a way to model (U)SIM smart card functionalities in UML. We use the test generator on our (U)SIM smart card UML models and automatically produce our first test cases. ...
Usually, testing smart card software is carried-out by specialized engineers in a proprietary language. Testing represents generally half of smart card development effort. ...
To begin our experience, we shall limit our domain to (U)SIM smart cards. For (U)SIM smart cards, there are different standards, which describe a lot of card features. ...
doi:10.1007/11733447_25
fatcat:ob3s2t473jdbnadx4qcfhyypoa
The U-Constructs: Four Information Drives
2006
Communications of the Association for Information Systems
This article elaborates and extends several concepts that lay the foundation for thinking about next-generation information requirements. ...
Facing a world of ubiquitous networks and universal devices, a world in which users can access networks at any time from any place using a range of devices to invoke unique and personalized services, it ...
The smart card, also called a SIM (Subscriber Identity Module) card, contains subscription and security related data as well as customer data, The U-Constructs: Four Information Drives, by I.A. ...
doi:10.17705/1cais.01726
fatcat:bj2ahirw75aibhp2i3nirhm44i
(U)Simmonitor: A Mobile Application For Security Evaluation Of Cellular Networks
2016
Zenodo
Based on this observation, this paper presents the design and implementation of a novel mobile application named (U)SimMonitor that captures and analyses the security policy that a cellular operator enforces ...
The obtained results allow us to quantify, compare and evaluate their applied security as well as pinpoint a set of generic critical observations. ...
Vodafone also presents a low rate of IMSI request, 4%. On the other hand, Wind depicts a high rate of IMSI request that reaches 41% for SIM cards and 55% for USIM cards. ...
doi:10.5281/zenodo.153964
fatcat:ss7cicp2t5gp7ohrmv25ofk2ty
U-Commerce: Expanding the Universe of Marketing
2002
Journal of the Academy of Marketing Science
This article introduces several new concepts that lay the conceptual foundation for thinking about next-generation marketing based on ubiquitous networks. ...
U-commerce, or Über-commerce, is predicated on the characteristics of network ubiquity, universality, uniqueness, and unison. ...
Smart cards and chips containing personal electronic information will automate personal consumption of service staples (Sheth and Sisodia 2000) . ...
doi:10.1177/009207002236909
fatcat:qivsklsy7bgntksikr34hnod7e
Power consumption profile analysis for security attack simulation in smart cards at high abstraction level
2005
Proceedings of the 5th ACM international conference on Embedded software - EMSOFT '05
As they store and deal with confidential and secret data many attacks are performed on these cards to reveal this private information. Consequently, the security demands on smart cards are very high. ...
This paper presents a hierarchical security attack simulation flow for smart card designs where security attacks can be simulated in the processor specific model at transaction layer 1 in SystemC. ...
A power data file is generated while the smart card specific model is simulating. ...
doi:10.1145/1086228.1086268
dblp:conf/emsoft/RothbartNSWRM05
fatcat:llvehbvbrzc63ejv2zjjkkwrxa
Use of Smartphone for Supportive Supervision in Nigeria
2015
iBusiness
Objective: Describe the value of smart phones in improving quality of supervision. Methods: This is a descriptive study. ...
The time spent on supervision was reduced to 2 hrs per facility using the smart phones compared to 4 hrs when using the paper based at other sites. ...
Examining the time spent on supervision portrays that there was reduction of time spent on supervision from sim card smartphones and improved network coverage report transmission to higher level is guaranteed ...
doi:10.4236/ib.2015.72009
fatcat:ey75ifwgqng6hfrkz7prulm2am
Electronic doorbell system using keypad and GSM
2020
International Journal of Informatics and Communication Technology (IJ-ICT)
This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would ...
<p><span lang="EN-US">In our homes or offices, security has been a vital issue. ...
GSM messages testing codes To complete the test, these steps were followed: − A Subscriber Identification Module (SIM) card was inserted into the modem. − After uploading the system was powered off and ...
doi:10.11591/ijict.v9i3.pp212-220
fatcat:mrm6vsbb7jeh7jr3gp67bbq7mu
Smart Health Care System-An Easy First Aid Solution
2017
International Journal of Computer Applications
Testing Unit Testing, Integration testing, System testing and Performance testing were carried out ensure reliability of entire Smart Healthcare System. ...
Based on various tests carried out in various environments and conditions, Smart Health Care System has showed 95% reliability and 79% accuracy. ...
doi:10.5120/ijca2017915999
fatcat:cx4v4wkmjbdtjhhsl2nyebw3ye
Reference Material for Assessing Forensic SIM Tools
2007
2007 41st Annual IEEE International Carnahan Conference on Security Technology
Some of the earliest, general purpose, forensic tools for cell phones targeted SIMs to recover digital evidence. ...
It allows a forensic specialist to determine how to compensate for any shortcomings identified or whether to use one version of the tool in lieu of another. ...
File Access Controls SIMs, as with smart cards in general, employ a range of tamper resistance techniques to protect their contents. ...
doi:10.1109/ccst.2007.4373494
fatcat:56i4fyvwafaytharspx26xsp5i
On the potential of high density smart cards
2006
Information Security Technical Report
Bending & twisting tests are fine for a physical card that sits in the users pocket or wallet but unnecessary as a SIM card or a PC peripheral. ...
The former is a byte oriented protocol and is typically the default used in (U)SIM cards whereas the latter is a block protocol commonly used in banking applications such as EMV [8] cards. ...
doi:10.1016/j.istr.2006.05.002
fatcat:loxiqtgotnahrnjn5kbo4ev7py
Overcoming Impediments to Cell Phone Forensics
2008
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
For example, most cell phones do not contain a hard drive and rely instead on flash memory for persistent storage. ...
Cell phones are also designed more as specialpurpose appliances that perform a set of predefined tasks using proprietary embedded software, rather than general-purpose extensible systems that run common ...
Either a specialized reader that accepts a SIM directly or a general-purpose reader for a full-size smart card can be used, provided that it is compatible with the PC/SC (Personal Computer/Smart Card) ...
doi:10.1109/hicss.2008.341
dblp:conf/hicss/JansenDM08
fatcat:q2qtca44xnhuperjkcbc6xr5ci
E-commerce applications of smart cards
2001
Computer Networks
They are embedded in a plastic card that looks like a traditional magnetic stripe credit-card. We review the state of the art of e-commerce applications of smart cards. ...
Smart cards (also called chip cards or IC-cards) are portable modest computing devices with programmable data store and certain tamper-resistance capabilities. ...
With GemXplorer SIM card files can be edited, modified and tested using a fully graphical interface. ...
doi:10.1016/s1389-1286(01)00166-9
fatcat:gnlafnc3i5gltc3lbqgvm2hqey
Mobility Irregularity Detection with Smart Transit Card Data
[chapter]
2020
Lecture Notes in Computer Science
Experimental results on a large-scale dataset demonstrate that our model outperforms the state-of-the-art methods on recall, F1 score and accuracy. ...
First, all passenger transits are fused in a certain region at a timestamp whereas each passenger has own repetitive stops and time slots. ...
Visualization on the Passenger Pattern In order to test if distinguishable patterns were learnt, a subset of the test data is visualized on raw features and learned features u N , u N +1 (see Fig. 4) ...
doi:10.1007/978-3-030-47426-3_42
fatcat:o646q2ipnvfzpa5tjfdzmgpy7a
Google Android: A Comprehensive Security Assessment
2010
IEEE Security and Privacy
Authentication usually occurs via SIM card and associated protocols. ...
Prevents buffer overflows and stack
smashing
Mobile carrier security features
Smart phones use SIM cards to authenticate
and authorize user identity. ...
Asaf Shabtai, CISSP, is a PhD student at Ben-Gurion ...
doi:10.1109/msp.2010.2
fatcat:xwh3y4lrxzhytau6zuu5nywqoe
Forensic Tools for Mobile Phone Subscriber Identity Modules
2006
Journal of Digital Forensics, Security and Law
Forensic SIM tools require either a specialized reader that accepts a SIM directly or a general-purpose reader for a full-size smart card. ...
Standard-size smart card adapters are also available for SIMs, which allows them to be inserted into and read with a conventional smart card reader. ...
doi:10.15394/jdfsl.2006.1006
fatcat:krtnkudlfzfprej62m7dyt2rnq
« Previous
Showing results 1 — 15 out of 1,889 results