Search for dissertations about: "security issues in mobile phones"

Found 5 swedish dissertations containing the words security issues in mobile phones.

  1. 1. Integrated Security Platform for Mobile Applications

    Author : Hao Zhao; Sead Muftic; Fisseha Mekuria; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Integrated Security Platform; UICC; security; mobile applications; Secure Mobile Wallet; Other information technology; Övrig informationsteknik; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : This report describes our concept, design and current implementation of theIntegrated Security Platform for mobile applications.The increasing use of mobile applications is the trend of mobile communicationtechnology. Under initiatives of ISO, ETSI, GSMA and other standardization bodies,mobile applications play more and more important role. READ MORE

  2. 2. Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems

    Author : Leonardo H Iwaya; Simone Fischer-Hübner; Leonardo Martucci; Rose-Mharie Åhlfeldt; Sokratis Katsikas; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Mobile health; information security; data privacy; data collection; personal health data; Computer Science; Datavetenskap; Computer Science; Datavetenskap;

    Abstract : Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. READ MORE

  3. 3. Contributions to Web Authentication for Untrusted Computers

    Author : Anna Vapen; Nahid Shahmehri; Simone Fischer-Hübner; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Authentication; security levels; identity management; 2-clickAuth; information security; Computer science; Datalogi;

    Abstract : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. READ MORE

  4. 4. Secure Applications for Financial Environments (SAFE) System

    Author : Feng Zhang; Sead Muftic; Zhong Chen; KTH; []
    Keywords : Mobility; Financial Transactions; Security; Service-Oriented Architecture;

    Abstract : One of the main trends in the IT field today is to provide more mobility to existing IT based systems and users. With this trend, more and more people are using mobile financial transactions due to a widespread proliferation of mobile phones and wireless technologies. One of the most important concerns with such transactions is their security. READ MORE

  5. 5. Embedded internet system architectures

    Author : Åke Östmark; Luleå tekniska universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Inbyggda system; Embedded System;

    Abstract : Today, using computers is a daily thing for many people over the world. We use computers to for example communicate, read news, search for sport events, correspond with e-mail, participate in meetings, and download the latest polyphonic ring tones for our mobile phones. READ MORE