2016 Second International Conference on Mobile and Secure Services (MobiSecServ)

26-27 Feb. 2016

Filter Results

Displaying Results 1 - 22 of 22
  • [Back cover]

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2016, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speech

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Investigating the keylogging threat in android — User perspective (Regular research paper)

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    Keylogging threats have been reasonably studied in computer systems but poorly covered in the domain of mobile operating systems. Android took the lead among the other mobile operating systems in allowing developers to build custom third-party keyboards to replace the stock Android on-screen keyboard. This opened the door for malicious developers to create keyloggers for the purpose of spying and/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvising performance of Advanced Encryption Standard algorithm

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    The requirement of information security on a network has become highly challenging. Cryptography is a method to provide information confidentiality, authenticity and integrity. The cryptography overcomes several challenges such as execution time, memory requirement, and computation power. However, we cannot get desired outcomes by using sequential computation. In this paper, we introduce parallel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An online security protocol for NFC payment: Formally analyzed by the scyther tool

    Publication Year: 2016, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Nowadays, NFC technology is integrated into bank cards, smartphones and sales point terminals in order to immediately execute payment transactions without any physical contact. EMV is the standard intended to secure both contact (traditional) and contactless-NFC payment operations. In fact, researchers in recent years have detected some security vulnerabilities in this protocol (EMV). Therefore, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile payment security, threats, and challenges

    Publication Year: 2016, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Mobile payment systems can be divided into five categories including mobile payment at the POS, mobile payment as the POS, mobile payment platform, independent mobile payment system, and direct carrier billing. Although mobile payment has gained its popularity in many regions due to its convenience, it also faces many threats and security challenges. In this paper, we present a mobile payment proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Node Selection Process for quality of service provisioning over wireless multimedia sensor networks

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    Several quality of service (QoS) routing strategies focus on the improvement of throughput and end-to-end delays in wireless sensor networks (WSNs). With emergence of wireless multimedia sensor networks (WMSNs), data traffic can be poised into reliability-demanding data packets and time-sensitive data packets. In such situations, node optimization and load balancing can improve QoS provisioning. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper

    Publication Year: 2016, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1531 KB) | HTML iconHTML

    Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we present secure elements providing TLS and DTLS stacks, and running the CoAP protocol dedicated to IoT systems. These secure elements are used in an electronic lock context, in which the lock is a CoAP server and the key a CoAP client. We define two main security domains one f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NFC4Sure: Mobile ticketing system

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Modern public transportation ticketing systems are now evolving from the usage of contactless smartcards to mobile devices based on Near Field Communication and Host Card Emulation. NFC4Sure ticketing solution proposed in this work integrates seamlessly with existing ticketing technologies, without requiring a hardware secure element in the mobile phone and a permanent online interaction1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an "Host Card Emulation" system of security ? Invited paper

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Mobile payment transactions with a NFC device are secured by two main architectures. The first is in using a "Secure Element" included in the mobile phone, the second using an external "Host Card Emulation" architecture where the banking card emulation is realized in a grid connected by the air to the mobile phone. That last solution seems to be the preferred solution today. Is it possible to frau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.