{"title":"移动消息完整性的提取与验证","authors":"R. Verma, D. Tomar, S. Rathore","doi":"10.1109/CSNT.2011.17","DOIUrl":null,"url":null,"abstract":"Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Extraction and Verification of Mobile Message Integrity\",\"authors\":\"R. Verma, D. Tomar, S. Rathore\",\"doi\":\"10.1109/CSNT.2011.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.\",\"PeriodicalId\":294850,\"journal\":{\"name\":\"2011 International Conference on Communication Systems and Network Technologies\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Communication Systems and Network Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT.2011.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2011.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extraction and Verification of Mobile Message Integrity
Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.