SAHCI: scheduling approach for heterogeneous content-centric IoT applications

F Al-Turjman, E Ever, YB Zikria, SW Kim… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the dominating paradigms of the new era with its
abilities to provide ubiquitous intelligence and pervasive interconnections to diverse …

Quantum secure communication between service provider and Sim

E Karacan, A Karakaya, S Akleylek - IEEE Access, 2022 - ieeexplore.ieee.org
In resource-constrained devices such as Subscriber Identity Module (SIM), the possibility of
using authentication and key exchange methods, which include the mutual verification of …

RONFC: a novel enabler-independent NFC protocol for mobile transactions

I Turk, P Angin, A Cosar - IEEE Access, 2019 - ieeexplore.ieee.org
The use of near field communication (NFC) technology for contactless mobile transactions
has become popular in the past decade with the availability of this technology in mobile …

[PDF][PDF] Development of a Client/Server Cryptography-Based Secure Messaging System Using RSA Algorithm

F Sönmez, MK Abbas - J. Manag. Eng. Inf. Technol, 2017 - academia.edu
The efficiency and effectiveness of the information systems, in many ways, depend on its
architecture and how data are transmited among different parties. Similarly, a very crucial …

Security Mechanisms in Hybrid Environments: The Case of Token Online Application

BO Kose, V Coskun, MO Capa… - … Congress on Human …, 2024 - ieeexplore.ieee.org
As hybrid applications become more widespread in today's digital environment, it is crucial
to enhance their security to protect against a wide range of threats. The Token Online …

Development of a SIM card based key management system

BÖ Köse, C Çevikbaş, HA Mantar… - Avrupa Bilim Ve Teknoloji …, 2020 - dergipark.org.tr
Today, almost all applications running on the smartphone provide valuable and sensitive
transactions on user's private data such as identity data, credit card details, payment data …

Design of a Secure Key Management System for SIM Cards: SIM-GAYS

BÖ Köse, C Cevikbaş, HA Mantar… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Today, the increasing security needs of mobile applications and service providers make SIM
(Subscriber Identity Module) cards an important candidate for providing desired secure …

A Generic Remote Key Loading Method for Enhancing Payment Systems

BO Kose, V Coskun, H Uluoz - 2023 7th International …, 2023 - ieeexplore.ieee.org
The dynamic nature of digital transactions creates a greater need for advanced security
mechanisms and protocols for terminal points, especially in payment solutions. Traditional …

Password-based SIMSec protocol

S Akleylek, E Karacan - Dicle Üniversitesi Mühendislik Fakültesi …, 2020 - dergipark.org.tr
The purpose of the SIMSec protocol is to provide the infrastructure to enable secured access
between the SIM (Subscriber Identity Module) card which doesn't have an ephemeral key …

[PDF][PDF] ENHANCING SIM CARD TECHNOLOGY: DEVELOPING AN ADVANCED OPERATING SYSTEM

BO Kose, A Sardag, V Coskun, HA Mantar - science.lpnu.ua
The emergence of smart cards is a significant achievement in the field of information
technology. They are growing in importance as they offer secure data storage and …