- Behavioral Analog Topology Synthesizerhttps://sites.google.com/
site/netlist2scheme/ - Cool Teen Buddy
https://sites.google.com/site/coolteenbuddy/ - Diman Zad-Tootaghaj 's Academic Websitehttps://sites.google.com/
site/dimantootaghaj/ - Eigenvalues-based Steganalysishttps://sites.google.com/site/
eigenvaluesbasedsteganalysis/ - FARHAThttps://sites.
google.com/site/farhat83site/ - Farsheed Farhathttps://sites.google.com/
site/farsheed83/ - Farshid Farhat 's Google-Pagehttps://sites.google.com/
site/farshidfarhat2/ - Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhathttps://sites.google.
com/site/farshidfarhat/ - frash downloadshttps://sites.google.com/site/
frashdownloads/ - frashpixhttps://sites.google.com/site/
frashpix/ - Game Theoretic Network SimulatorGame Theory Network Simulator Game Strategies in Network Security Simulation by Visual C++https://sites.google.com/
site/ gametheoreticnetworksimulator/ - Multi-Dimensional Correlated SteganalysisMulti-Dimensional Correlated Steganalysis (MDCS) Multi-Dimensional Correlation (MDC) Steganalysis by Dimensional Cross Correlationhttps://sites.
google.com/site/ mdimcorrsteganalysis/ - Optical CDMA Network Simulatorhttps://sites.google.com/site/
opticalcdmanetworksimulator/ - Sharif Students 79https://sites.google.com/
site/sharifstudents79/ - Sharif Students Serviceshttps://sites.google.com/
site/sharifstudentsservices/ - Student Branch of Iranian Society of CryptologyStudent Branch of Iranian Society of Cryptology at Sharif University of Technologyhttps://sites.
google.com/site/sbisc4sharif/ - Wireless Mobile Adhoc Network Simulatorhttps://sites.google.com/
site/wmanetsecsim/ - https://sites.
google.com/site/navayesegah/ - https://sites.google.com/
site/farshid83site/ - https://sites.google.com/
site/sbisc4sut/ - https://sites.google.com/
site/xtra4security/
Friday, April 17, 2020
Eigenvalues-based Steganalysis
Wednesday, March 25, 2020
System and methods for UICC-based secure communication
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.
System and methods for UICC-based secure communication
SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION 20150222631
SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION 20150222631
Subscribe to:
Posts (Atom)