Issues of identity verification of typical applications over mobile terminal platform
Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identi...
Saved in:
Main Authors: | Xiaolin ZHANG, Dawu GU, Chi ZHANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020081 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Technology and Application of High-Capacity USIM Card
by: Shuanghe Dong, et al.
Published: (2015-03-01) -
AppAuth: Authorship Attribution for Android App Clones
by: Guoai Xu, et al.
Published: (2019-01-01) -
Determination of generations X, Y, Z user preferences in the Russian mobile application market
by: E. S. Bozhenko, et al.
Published: (2023-03-01) -
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
by: Qiuhan WU, et al.
Published: (2018-09-01) -
Analysis of Terminal Security Issue and Solution in Mobile Internet Era
by: Liyun Yan, et al.
Published: (2014-12-01)