List several security issues in a personal communication system .Explain some techniques to solve these issues?
Karthik 10-November-2007 03:33:57 PM

Comments


www.cal-impac.org/ScienceII/CompSci04_Annual.doc
Posted by crouse


www.blackhat.com/html/bh-usa.../bh-usa-09-speakers.html
Posted by crouse


www.computerweekly.com
Posted by crouse


Authentication prevents fraud(cloning) as we do the authorization and
checks wether it is the real subcriber or a clone, and we give temporary
identities to the subscribers which we change so that if a person wants to
done,we may not do so as the temporary ID will change.
Eves dropping can be prevented by encryptimp the signaling as well
as the information do that no one unauthanticated can use the data.
Subscribers identity can be prevented by seing temporary identity and
using authentication to access the subscribers identity

Posted by Fangzhou



Posted: 10-November-2007 04:13:25 PM By: Fangzhou

Authentication prevents fraud(cloning) as we do the authorization and
checks wether it is the real subcriber or a clone, and we give temporary
identities to the subscribers which we change so that if a person wants to
done,we may not do so as the temporary ID will change.
Eves dropping can be prevented by encryptimp the signaling as well
as the information do that no one unauthanticated can use the data.
Subscribers identity can be prevented by seing temporary identity and
using authentication to access the subscribers identity

Posted: 29-May-2009 04:17:52 AM By: crouse

www.computerweekly.com

Posted: 16-September-2009 07:41:56 AM By: crouse

www.blackhat.com/html/bh-usa.../bh-usa-09-speakers.html

Posted: 16-September-2009 07:46:12 AM By: crouse

www.cal-impac.org/ScienceII/CompSci04_Annual.doc