Essays about: "uicc"

Found 4 essays containing the word uicc.

  1. 1. Security for Mobile Payment Transaction

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Girmay Desta; [2012]
    Keywords : Strong Authentication; mobile security; PIV; mobile PKI; payment privacy; EMV security;

    Abstract : The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that is closer to the reach of individuals. For instance, mobile applications have evolved in different sectors such as healthcare patient support, geographic mapping and positioning, banking, e-commerce payment services and others. READ MORE

  2. 2. Secure Identification in Social Wireless Networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Omer Nawaz; [2011]
    Keywords : Secure Identification; Internet Security; GBA; UICC;

    Abstract : The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. READ MORE

  3. 3.  A secure mobile phone-based interactive logon in Windows

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Oleksandr Bodriagov; [2010]
    Keywords : ;

    Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE

  4. 4. Evaluation of UICC-based IMS authentication schemes

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : Adeel Jadoon; [2009]
    Keywords : UICC; IMS;

    Abstract : This thesis study involves evaluation of UICC based IMS authentication schemes. The schemes included in this study are IMS AKA, E-IMS AKA, One-Pass GPRS IMS authentication and Early IMS security. These schemes are evaluated on the basis of security, user friendliness and simplicity. READ MORE