{"title":"SafeSMS -端到端SMS加密","authors":"M. Hassinen","doi":"10.1109/CONTEL.2005.185905","DOIUrl":null,"url":null,"abstract":"Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"SafeSMS - end-to-end encryption for SMS\",\"authors\":\"M. Hassinen\",\"doi\":\"10.1109/CONTEL.2005.185905\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.\",\"PeriodicalId\":265923,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"volume\":\"207 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONTEL.2005.185905\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONTEL.2005.185905","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

摘要

我们的主要贡献是短信服务的保密性、完整性和身份验证。我们将展示如何在没有任何额外硬件的情况下使用移动电话安全地发送、接收和存储文本消息。此外,我们将展示如何对消息的发送方进行身份验证,以及如何确保消息未被篡改。编程语言Java用于实现我们的目标。本文描述了应用解决方案,而加密方法的细节在参考文章中进行了描述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SafeSMS - end-to-end encryption for SMS
Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An insight into challenges of international and multicultural knowledge transfers within ict industry An energy efficient protocol exploiting cache data for sensor networks Prediction of possible congestions in SLA creation process Toward automatic generation of promela models from SDL specification All optical fibre auxiliary carrier based 2R regenerator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1