Security on mobile phones with lightweight cryptographic message syntax

Download
2007
Kubilay, Murat Yasin
Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected around certificate based key management and symmetric cryptography. In this thesis, a lightweight CMS envelope is proposed for the mobile phones which have limited memory and processing power, in order to provide the privacy of the data either stored on them or exchanged by means of multimedia messaging (MMS) and e-mail. A sample prototype is implemented on mobile phone which makes use of the proposed lightweight CMS. The prototype is compared with standard CMS in terms of application size and performance. The application size decreases approximately by 35% and the envelope preparation duration is much shorter with lightweight CMS in comparison to standard CMS.

Suggestions

Data mining for rule discovery in relatonal databases
Toprak, Serkan; Alpaslan, Ferda Nur; Department of Computer Engineering (2004)
Data is mostly stored in relational databases today. However, most data mining algorithms are not capable of working on data stored in relational databases directly. Instead they require a preprocessing step for transforming relational data into algorithm specified form. Moreover, several data mining algorithms provide solutions for single relations only. Therefore, valuable hidden knowledge involving multiple relations remains undiscovered. In this thesis, an implementation is developed for discovering mul...
A Static analysis approach for service oriented software engineering (SOSE) designs
Çermikli, Can; Doğru, Ali Hikmet; Department of Computer Engineering (2010)
In this thesis, a static analysis approach is introduced in order to develop correct business processes according to the Web Service Business Process Execution Language (WS-BPEL) specification. The modeling of the business processes are conducted with Business Process Execution Language (BPEL) which is a popular orchestrator of Service Oriented Architectures (SOA) based system through the description of workflow. This approach is also integrated to the Service Oriented Software Engineering (SOSE) design tec...
Implementation of concurrent constraint transaction logic and its user interface
Altunyuva, Fethi; Karagöz, Pınar; Department of Computer Engineering (2006)
This thesis implements a logical formalism framework called Concurrent Constraint Transaction Logic (abbr.,CCTR) which was defined for modeling and scheduling of workflows under resource allocation and cost constraints and develops an extensible and flexible graphical user interface for the framework. CCTR extends Concurrent Transaction Logic and integrates with Constraint Logic Programming to find the correct scheduling of tasks that involves resource and cost constraints. The developed system, which integ...
Semantically enriched web service composition in mobile environments
Ertürkmen, K. Alpay; Doğaç, Asuman; Department of Information Systems (2003)
Web Services are self-contained, self-describing, modular applications that can be published, located, and invoked through XML artefacts across the Web. Web services technologies can be applied to many kinds of applications, where they offer considerable advantages compared to the old world of product-specific APIs, platform-specific coding, and other أbrittleؤ technology restrictions. Currently there are millions of web services available on the web due to the increase in e-commerce business volume. Web se...
Automatic Definition of Optimal Default Parameters of Models: Image Matting Application
Ravve, Elena V.; Volkovich, Zeev; Weber, Gerhard Wilhelm (2015-09-24)
As a general rule, each user must provide the tool applied with particular values of its input parameters. An inexperienced user may hardly figure out their values and the tool developer must define the default values in order to help her/him. We present an approach to solve the problem with the help of multi-criteria optimization that is new in this formulation. We demonstrate our approach in closer details using an example from the automatic definition of optimal default parameters for real-time merging o...
Citation Formats
M. Y. Kubilay, “Security on mobile phones with lightweight cryptographic message syntax,” M.S. - Master of Science, Middle East Technical University, 2007.