As long-term evolution (LTE) networks, such as Telstra's new 4G network, bring about super fast mobile broadband to consumers across the globe, they could also potentially open up smartphones, tablets and other devices to hacks that previously only concerned PC users, according to network vendor Alcatel-Lucent.
Sunday, 27 November 2011
Saturday, 26 November 2011
AusCert senior security analyst Marco Ostini has called for drastic international action to fix security holes in the 2G cellular network that currently leave everyone vulnerable to attack, even though telcos are moving to 4G networks and beyond.
Tuesday, 20 September 2011
Information about Modern (Post-quantum and Fully homomorphic) Cryptography, DNSSEC, Best Practices for Cloud Security, Cloud Security Audit, some materials from Cloud Security Alliance and Trusted Cloud Initiative.
Tuesday, 13 September 2011
Tags - policy-based key management, unique server authentication using identity-based and integrity-based validation.
Sunday, 28 August 2011
Sunday, 14 August 2011
Thursday, 14 July 2011
Saturday, 2 July 2011
Sunday, 26 June 2011
Saturday, 25 June 2011
For big and transnational mobile operators - cloud (distributed) architecture for mobile network, global roaming, picocell, femtocell, Microcell, Wireless access point already exist.
And of course, for this Cloud architecture we require Cloud Billing :-).
Mobile operators in some countries use common core network - it's cheaper for each operator. Cloud technology is cheaper too. Many ways to implement this in mobile telecom.
But, for the first, we need to solve some access and security problems regarding this direction.
For further reading see my site - CloudsTele.com - information about all types of Clouds for Telecom industry.
Thursday, 14 April 2011
Friday, 18 March 2011
Sunday, 20 February 2011
Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.
Saturday, 29 January 2011
NIST SP 800-144 provides an overview of the security and privacy challenges for public cloud computing and gives recommendations that organizations should consider when outsourcing data, applications, and infrastructure to a public cloud environment.
NIST SP 800-145 restates the existing NIST cloud computing definition as a formal NIST publication.
NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances
Transitions Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths - NIST 800-131A
NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.
Special Publication (SP) 800-131A link