Resources (books)

Wireless Communications Security:Solutions for the Internet of Things

This chapter discusses the principles of Internet of Things (IoT) by interpreting its typical definitions and analysing the suitability of it in different environments. The overall development of IoT is explained by investigating the evolution of machine to machine (M2M)…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.

Wireless Communications Security:Security of Wireless Systems

This chapter describes the security architecture of the most relevant modern wireless and mobile systems, with the main weight on 3rd Generation Partnership Program (3GPP) and Institute of Electrical and Electronics Engineers (IEEE) 802 networks. The security aspects of satellite…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.


Wireless Communications Security: Wireless Payment and Access Systems

This chapter outlines the current most relevant solutions for mobile payment and access control. It discusses the EMV Company (EMVCo) concept and other banking systems along with selected use cases such as ecommerce, transport and access systems. Commercial markets are…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.

Wireless Communications Security: Smartcards and Secure Elements

This chapter presents key technologies related to smartcards and secure elements (SEs), especially as they relate to the wireless systems. It outlines the available and future alternatives for traditional and enhanced variants of smartcards. Smartcards represent a type of SE…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.


Wireless Communications Security: Monitoring and Protection Techniques

This chapter discusses techniques for the protection of mobile communications, services, users and applications. Real time network analysis and protection techniques are summarized such as deep packet investigation, virus protection and Legal/Lawful interception (LI). The protection needs to be scalable…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.

Wireless Communications Security: Mobile Subscription Management

This chapter presents technologies for managing mobile devices and subscriptions based on Over the Air (OTA) methodologies. It also presents the general architectures and functionalities of the Subscriber Identity Module (SIM) OTA platforms, and outlines examples from the commercial field…
0   0
Resource proposed by Milena Bigatto in the book category.
0 comment.

You did not find what you were looking for ? Ask for a lesson now.