2009
DOI: 10.1007/978-3-642-04766-4_12
|View full text |Cite
|
Sign up to set email alerts
|

Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0
1

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 31 publications
0
4
0
1
Order By: Relevance
“…Furthermore, they can be used to provide other security and trust management services such as multiple identities, exchange of keys, mobile real-time services, etc. (Kalman and Noll, 2007;Mayes and Markantonakis, 2008;Roßnagel and Muntermann, 2009;Rust et al, 2008).…”
Section: Introductionmentioning
confidence: 91%
See 1 more Smart Citation
“…Furthermore, they can be used to provide other security and trust management services such as multiple identities, exchange of keys, mobile real-time services, etc. (Kalman and Noll, 2007;Mayes and Markantonakis, 2008;Roßnagel and Muntermann, 2009;Rust et al, 2008).…”
Section: Introductionmentioning
confidence: 91%
“…A deeper analysis on qualified signatures can be found in (Rossnagel, 2004;Rossnagel and Royer, 2005). SIMs/USIMs, under EAL 4+ specification, have been considered SSCD because they are tamper-resistant devices that can be used as a trusted storage for the private key (where the key never leaves it) as well as other security-related information (Kalman and Noll, 2007;Mayes and Markantonakis, 2008;Roßnagel and Muntermann, 2009). Furthermore, they can be used to provide other security and trust management services such as multiple identities, exchange of keys, mobile real-time services, etc.…”
Section: Introductionmentioning
confidence: 98%
“…Roßnagel and Muntermann [2] suggested the use of a SIM card as a security module in mobile devices to ensure accountability, confidentiality and integrity in real-time services (information and transaction services). Pohlmann et al [3], and Hassinen et al [4] also proposed to use a PKI-enabled SIM card based on a public key infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…Perangkat ajar yang digunakan sebaiknya bersifat mobile karena piranti mobile memiliki kemampuan untuk bergerak dan mampu memenuhi kebutuhan pengguna tanpa harus terikat pada satu tempat atau sumber daya [3].…”
unclassified