Learn More
This paper presents a new concept, called tandem, dedicated to smart cards that control TLS-based applications. The originality of this approach is to introduce a collaborative process between a smart card and its docking host. This technology enables the secure downloading of a huge amount of data, in untrustworthy computers. We present software paradigms(More)
The fundamental network-security services required for SIP are: preserving the confidentiality and integrity of messaging, preventing replay attacks or message spoofing, providing for the authentication and privacy of the participants in a session, and preventing DoS attacks. This paper introduces the SIP related security problems, illustrates some of(More)
The Global System for Mobile Communications (GSM) specifications introduce the 03.48 standard to allow the OTA (on-the-air) platform to securely communicate with SIM (subscriber identity module) cards. This standard operates above unreliable links such as SMS instead of reliable transport protocols such as TCP. In this paper, we propose to introduce the SSL(More)
This paper presents the first implementation of the EAPTLS (Extensible Authentication Protocol-Transport Layer Security) protocol in smartcards. Tests, performed on two java devices, are discussed and analysed. Results show that TLS processing is slow, because smartcards are not (yet) optimized for that purpose; however we clearly demonstrate that TLS(More)
The NFC (Near Field Communication) is a promising technology for the Internet of Things (IoT). It enables proximity communications (a few centimeters) with modest throughputs (hundreds Kbit/s) and low power consumption (a few mW). Although this technology is deployed for payment, access control, transport, or file transfer applications, it does not support(More)
This article presents a simulator which generates synthetic data for fraud detection. It models fraudsters and legitimate users. Mobile payments become more and more popular and, thus, are very attractive targets for fraudsters. As new ways to commit crimes and avoid detection appear, research in the field of fraud is always evolving. Yet, research in fraud(More)