List several security issues in a personal communication system .Explain some techniques to solve these issues?
Karthik 10-November-2007 03:33:57 PMComments www.cal-impac.org/ScienceII/CompSci04_Annual.doc Posted by crouse www.blackhat.com/html/bh-usa.../bh-usa-09-speakers.html Posted by crouse www.computerweekly.com Posted by crouse Authentication prevents fraud(cloning) as we do the authorization and checks wether it is the real subcriber or a clone, and we give temporary identities to the subscribers which we change so that if a person wants to done,we may not do so as the temporary ID will change. Eves dropping can be prevented by encryptimp the signaling as well as the information do that no one unauthanticated can use the data. Subscribers identity can be prevented by seing temporary identity and using authentication to access the subscribers identity Posted by Fangzhou |
Posted: 10-November-2007 04:13:25 PM By: Fangzhou Authentication prevents fraud(cloning) as we do the authorization and checks wether it is the real subcriber or a clone, and we give temporary identities to the subscribers which we change so that if a person wants to done,we may not do so as the temporary ID will change. Eves dropping can be prevented by encryptimp the signaling as well as the information do that no one unauthanticated can use the data. Subscribers identity can be prevented by seing temporary identity and using authentication to access the subscribers identity | |
Posted: 29-May-2009 04:17:52 AM By: crouse www.computerweekly.com | |
Posted: 16-September-2009 07:41:56 AM By: crouse www.blackhat.com/html/bh-usa.../bh-usa-09-speakers.html | |
Posted: 16-September-2009 07:46:12 AM By: crouse www.cal-impac.org/ScienceII/CompSci04_Annual.doc |