As long-term evolution (LTE) networks, such as Telstra's new 4G network, bring about super fast mobile broadband to consumers across the globe, they could also potentially open up smartphones, tablets and other devices to hacks that previously only concerned PC users, according to network vendor Alcatel-Lucent.
Information about mobile telecommunications security in LTE, UMTS, GSM technology.
Sunday, 27 November 2011
Saturday, 26 November 2011
Insecure 2G needs global fix
link - Insecure 2G needs global fix: AusCERT
AusCert senior security analyst Marco Ostini has called for drastic international action to fix security holes in the 2G cellular network that currently leave everyone vulnerable to attack, even though telcos are moving to 4G networks and beyond.
Tuesday, 20 September 2011
www.CryptoClouds.com - Cryptography for Clouds!
My new site - www.CryptoClouds.com - Cryptography for Clouds!
Information about Modern (Post-quantum and Fully homomorphic) Cryptography, DNSSEC, Best Practices for Cloud Security, Cloud Security Audit, some materials from Cloud Security Alliance and Trusted Cloud Initiative.
Tuesday, 13 September 2011
Encryption is Not Enough for Cloud Security
Link - Encryption is Not Enough for Cloud Security
Tags - policy-based key management, unique server authentication using identity-based and integrity-based validation.
Sunday, 28 August 2011
Clouds for Telecom industry.
Please see my new site - CloudsTele.com - information about all types of Clouds for Telecom industry.
Sunday, 14 August 2011
Thursday, 14 July 2011
Saturday, 2 July 2011
Sunday, 26 June 2011
Saturday, 25 June 2011
Cloud for mobile operators.
IT Cutting Edge now it is CLOUD.
For big and transnational mobile operators - cloud (distributed) architecture for mobile network, global roaming, picocell, femtocell, Microcell, Wireless access point already exist.
And of course, for this Cloud architecture we require Cloud Billing :-).
Mobile operators in some countries use common core network - it's cheaper for each operator. Cloud technology is cheaper too. Many ways to implement this in mobile telecom.
But, for the first, we need to solve some access and security problems regarding this direction.
For further reading see my site - CloudsTele.com - information about all types of Clouds for Telecom industry.
For big and transnational mobile operators - cloud (distributed) architecture for mobile network, global roaming, picocell, femtocell, Microcell, Wireless access point already exist.
And of course, for this Cloud architecture we require Cloud Billing :-).
Mobile operators in some countries use common core network - it's cheaper for each operator. Cloud technology is cheaper too. Many ways to implement this in mobile telecom.
But, for the first, we need to solve some access and security problems regarding this direction.
For further reading see my site - CloudsTele.com - information about all types of Clouds for Telecom industry.
Thursday, 14 April 2011
Friday, 18 March 2011
Sunday, 20 February 2011
Globalisation of Mobile and Wireless Communications: Today and in 2020
Springer, 2010 - Technology & Engineering - 300 pages
Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.
book's link
Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.
book's link
Saturday, 29 January 2011
Guidelines on Security and Privacy in Public Cloud Computing - NIST SP 800-144 DRAFT
Jan. 28, 2011
NIST SP 800-144 provides an overview of the security and privacy challenges for public cloud computing and gives recommendations that organizations should consider when outsourcing data, applications, and infrastructure to a public cloud environment.
NIST SP 800-145 restates the existing NIST cloud computing definition as a formal NIST publication.
DRAFT link
NIST SP 800-144 provides an overview of the security and privacy challenges for public cloud computing and gives recommendations that organizations should consider when outsourcing data, applications, and infrastructure to a public cloud environment.
NIST SP 800-145 restates the existing NIST cloud computing definition as a formal NIST publication.
DRAFT link
Cryptographic Algorithms and Key Sizes for Personal Identification Verification
January 5, 2011
NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances
link
NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances
link
Transitions Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths - NIST 800-131A
January 13, 2011
NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.
Special Publication (SP) 800-131A link
NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.
Special Publication (SP) 800-131A link
Sunday, 23 January 2011
Subscribe to:
Posts (Atom)