Electronics & Communication Engineering Journal最新文献

筛选
英文 中文
Mobile agent security 移动代理安全
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020504
N. Borselius
{"title":"Mobile agent security","authors":"N. Borselius","doi":"10.1049/ECEJ:20020504","DOIUrl":"https://doi.org/10.1049/ECEJ:20020504","url":null,"abstract":"The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 215
The smartcard as a mobile security device 智能卡作为移动安全设备
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020503
D. Scheuermann
{"title":"The smartcard as a mobile security device","authors":"D. Scheuermann","doi":"10.1049/ECEJ:20020503","DOIUrl":"https://doi.org/10.1049/ECEJ:20020503","url":null,"abstract":"Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure mobile commerce 安全的移动商务
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020506
S. Schwiderski-Grosche, H. Knospe
{"title":"Secure mobile commerce","authors":"S. Schwiderski-Grosche, H. Knospe","doi":"10.1049/ECEJ:20020506","DOIUrl":"https://doi.org/10.1049/ECEJ:20020506","url":null,"abstract":"M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Security issues for downloaded code in mobile phones 手机中下载代码的安全问题
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020505
D. Babb, C. Bishop, T. Dodgson
{"title":"Security issues for downloaded code in mobile phones","authors":"D. Babb, C. Bishop, T. Dodgson","doi":"10.1049/ECEJ:20020505","DOIUrl":"https://doi.org/10.1049/ECEJ:20020505","url":null,"abstract":"'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security for mobility 移动安全
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020508
C. Mitchell
{"title":"Security for mobility","authors":"C. Mitchell","doi":"10.1049/ECEJ:20020508","DOIUrl":"https://doi.org/10.1049/ECEJ:20020508","url":null,"abstract":"* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Securing the delivery of digital content over the Internet 确保透过互联网传送数码内容
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020507
A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood
{"title":"Securing the delivery of digital content over the Internet","authors":"A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood","doi":"10.1049/ECEJ:20020507","DOIUrl":"https://doi.org/10.1049/ECEJ:20020507","url":null,"abstract":"This paper looks at the security issues that arise for the browsing, selection and delivery of digital content over the Internet. Particular emphasis is placed on the problems of finding security solutions for microtransactions (small items of content) and micropayments (low-value content), and the digital rights management issues concerning the protection of content after it has been delivered to consumers. The paper concludes with a description of the secure content delivery system developed during the SIBIS project, which addresses many of the issues raised.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Public key infrastructure in mobile systems 移动系统中的公钥基础设施
Electronics & Communication Engineering Journal Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020501
J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright
{"title":"Public key infrastructure in mobile systems","authors":"J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright","doi":"10.1049/ECEJ:20020501","DOIUrl":"https://doi.org/10.1049/ECEJ:20020501","url":null,"abstract":"In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Hidden antennas for vehicles 车辆隐藏式天线
Electronics & Communication Engineering Journal Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020601
R. Langley, J. Batchelor
{"title":"Hidden antennas for vehicles","authors":"R. Langley, J. Batchelor","doi":"10.1049/ECEJ:20020601","DOIUrl":"https://doi.org/10.1049/ECEJ:20020601","url":null,"abstract":"The introduction of new telematics and broadcast systems into vehicles has led to a requirement for multiple antennas that can be hidden from view. This paper commences by presenting the results of simulations to identify the components of a car's structure that influence the radiation pattern of a printed VHF antenna on the rear windscreen. Two dual-band antenna designs are then presented for operation in the 900 and 1800 MHz telephone bands. The first is a planar inverted-F antenna that can be concealed in the bumpers, the second a hybrid structure based on the top-loaded monopole principle and mounted beneath the vehicle's roof.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Opportunities in radar-2002 雷达的机遇-2002
Electronics & Communication Engineering Journal Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020602
M. Skolnik
{"title":"Opportunities in radar-2002","authors":"M. Skolnik","doi":"10.1049/ECEJ:20020602","DOIUrl":"https://doi.org/10.1049/ECEJ:20020602","url":null,"abstract":"This paper addresses some of the potential opportunities for achieving advances in radar systems and technology. It is not a summary of current interests in radar, nor is it a forecast of what 'will be', but is speculation about what 'could be' based on the limited experiences and personal biases of the writer. Included are the replacement of existing radars that have been in use for some time, 'on-the-shelf' concepts and demonstrated technology that have yet to be employed, a few new directions that might offer capabilities that do not currently exist, and areas of basic technology that could be further explored to provide new understanding and new capabilities. Although much is included in the paper, it is not meant to be an exhaustive enumeration of the many possible directions for future radar.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Future radar developments 未来雷达发展
Electronics & Communication Engineering Journal Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020605
H. Griffiths
{"title":"Future radar developments","authors":"H. Griffiths","doi":"10.1049/ECEJ:20020605","DOIUrl":"https://doi.org/10.1049/ECEJ:20020605","url":null,"abstract":"","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信