Learn More
This paper presents a new concept, called tandem, dedicated to smart cards that control TLS-based applications. The originality of this approach is to introduce a collaborative process between a smart card and its docking host. This technology enables the secure downloading of a huge amount of data, in untrustworthy computers. We present software paradigms(More)
The fundamental network-security services required for SIP are: preserving the confidentiality and integrity of messaging, preventing replay attacks or message spoofing, providing for the authentication and privacy of the participants in a session, and preventing DoS attacks. This paper introduces the SIP related security problems, illustrates some of(More)
The Global System for Mobile Communications (GSM) specifications introduce the 03.48 standard to allow the OTA (on-the-air) platform to securely communicate with SIM (subscriber identity module) cards. This standard operates above unreliable links such as SMS instead of reliable transport protocols such as TCP. In this paper, we propose to introduce the SSL(More)
This paper presents the first implementation of the EAPTLS (Extensible Authentication Protocol-Transport Layer Security) protocol in smartcards. Tests, performed on two java devices, are discussed and analysed. Results show that TLS processing is slow, because smartcards are not (yet) optimized for that purpose; however we clearly demonstrate that TLS(More)
  • Pascal Urien
  • 2015
This demonstration presents a new and innovative open platform whose goal is to enable secure mobile applications. Secure Elements (SE) are hosted in dedicated servers, whose protocol (RACS) is detailed by an IETF draft. They are remotely used from mobiles via secure TLS channels. These channels are booted from TLS NFC (Near Field Communication) smartcards(More)
This article presents a simulator which generates synthetic data for fraud detection. It models fraudsters and legitimate users. Mobile payments become more and more popular and, thus, are very attractive targets for fraudsters. As new ways to commit crimes and avoid detection appear, research in the field of fraud is always evolving. Yet, research in fraud(More)