SAHCI: scheduling approach for heterogeneous content-centric IoT applications
The Internet of Things (IoT) is one of the dominating paradigms of the new era with its
abilities to provide ubiquitous intelligence and pervasive interconnections to diverse …
abilities to provide ubiquitous intelligence and pervasive interconnections to diverse …
Quantum secure communication between service provider and Sim
E Karacan, A Karakaya, S Akleylek - IEEE Access, 2022 - ieeexplore.ieee.org
In resource-constrained devices such as Subscriber Identity Module (SIM), the possibility of
using authentication and key exchange methods, which include the mutual verification of …
using authentication and key exchange methods, which include the mutual verification of …
RONFC: a novel enabler-independent NFC protocol for mobile transactions
The use of near field communication (NFC) technology for contactless mobile transactions
has become popular in the past decade with the availability of this technology in mobile …
has become popular in the past decade with the availability of this technology in mobile …
[PDF][PDF] Development of a Client/Server Cryptography-Based Secure Messaging System Using RSA Algorithm
The efficiency and effectiveness of the information systems, in many ways, depend on its
architecture and how data are transmited among different parties. Similarly, a very crucial …
architecture and how data are transmited among different parties. Similarly, a very crucial …
Security Mechanisms in Hybrid Environments: The Case of Token Online Application
As hybrid applications become more widespread in today's digital environment, it is crucial
to enhance their security to protect against a wide range of threats. The Token Online …
to enhance their security to protect against a wide range of threats. The Token Online …
Development of a SIM card based key management system
Today, almost all applications running on the smartphone provide valuable and sensitive
transactions on user's private data such as identity data, credit card details, payment data …
transactions on user's private data such as identity data, credit card details, payment data …
Design of a Secure Key Management System for SIM Cards: SIM-GAYS
Today, the increasing security needs of mobile applications and service providers make SIM
(Subscriber Identity Module) cards an important candidate for providing desired secure …
(Subscriber Identity Module) cards an important candidate for providing desired secure …
A Generic Remote Key Loading Method for Enhancing Payment Systems
The dynamic nature of digital transactions creates a greater need for advanced security
mechanisms and protocols for terminal points, especially in payment solutions. Traditional …
mechanisms and protocols for terminal points, especially in payment solutions. Traditional …
Password-based SIMSec protocol
S Akleylek, E Karacan - Dicle Üniversitesi Mühendislik Fakültesi …, 2020 - dergipark.org.tr
The purpose of the SIMSec protocol is to provide the infrastructure to enable secured access
between the SIM (Subscriber Identity Module) card which doesn't have an ephemeral key …
between the SIM (Subscriber Identity Module) card which doesn't have an ephemeral key …
[PDF][PDF] ENHANCING SIM CARD TECHNOLOGY: DEVELOPING AN ADVANCED OPERATING SYSTEM
The emergence of smart cards is a significant achievement in the field of information
technology. They are growing in importance as they offer secure data storage and …
technology. They are growing in importance as they offer secure data storage and …