2009 Second International Conference on Computer and Electrical Engineering 2009
DOI: 10.1109/iccee.2009.128
|View full text |Cite
|
Sign up to set email alerts
|

Security in Mobile Governmental Transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…to Base Station Controller -managing all BTSs in the subsystem -or Mobile Services Switching Centre -fixed portion of a GSM network interfacing with the Radio subsystem and connecting other MSCs and to several geographically clustered BSCs) there is no more encryption involved [11]. Thereafter, SMS data travels in plain text [5]. For this reason, entities might be adamant about adopting this channel over which to transact sensitive information.…”
Section: B Privacy In Data Transmissionmentioning
confidence: 99%
“…to Base Station Controller -managing all BTSs in the subsystem -or Mobile Services Switching Centre -fixed portion of a GSM network interfacing with the Radio subsystem and connecting other MSCs and to several geographically clustered BSCs) there is no more encryption involved [11]. Thereafter, SMS data travels in plain text [5]. For this reason, entities might be adamant about adopting this channel over which to transact sensitive information.…”
Section: B Privacy In Data Transmissionmentioning
confidence: 99%
“…Luckily, some of the problems related to GSM are partly solved by the authors of [7] based on the Universal Mobile Telecommunication System (UMTS), while other problems remain unsolved. In [8] the authors presented that there is some kind of unauthorized access to the information within the database of the mobile centers and the clients' devices. The building of the other security layer and basic mobile construction progresses due to the security focus.…”
Section: Introductionmentioning
confidence: 99%