Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Data security for third generation telecommunication systems

Tools
- Tools
+ Tools

Delivasilis, Dimitrios L. (2003) Data security for third generation telecommunication systems. PhD thesis, University of Warwick.

[img]
Preview
PDF
WRAP_Theses_Delivasilis_2003.pdf - Unspecified Version - Requires a PDF viewer.

Download (6Mb) | Preview
Official URL: http://webcat.warwick.ac.uk/record=b1750373~S15

Request Changes to record.

Abstract

This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and weaknesses, presented in the beginning of this thesis, indicates the need of employing human voice as an alternative security solution. Consequently the presentation of the state of the art biometric solutions and their applicability to the desired communication medium is more than necessary. However, the lack of previous involvement of human voice in an encryption method with successful results, constitute the core of this work. The majority of biometric applications aim to improve the confidence of the system to know whether a user is who he or she claims to be (authentication) and a few of them help the system in deciding his/her identity (identification). This novel method of encryption combines wireless communication (especially Third Generation mobile phones), data security, digital signal processing and smart cards. All these four different research areas have been covered theoretically in the beginning of this thesis. Thorough discussion of the fundamental principles governing each area results in identifying the strengths and weaknesses of these four core research elements and benefits the implementation stages of this work. Continuing with the thesis and proceeding to the second part, the theoretical analysis has been backed up by experimental development and testing. Every aspect of the novel research architecture has been transformed into a research algorithm. The performance of the algorithm, its cohesion and coupling has been closely investigated. The overall result of the research work accompanied with the algorithm’s strengths and weaknesses, future directions together with possible applicability of the research solution provide the epilogue of this scientific journey has been discussed.

Item Type: Thesis (PhD)
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Library of Congress Subject Headings (LCSH): Computer security, Wireless communication systems, Mobile communication systems -- Security measures, Computer networks -- Security measures
Official Date: October 2003
Dates:
DateEvent
October 2003Submitted
Institution: University of Warwick
Theses Department: Department of Engineering
Thesis Type: PhD
Publication Status: Unpublished
Supervisor(s)/Advisor: Leeson, Mark S., 1963- , Green, Roger, 1951-
Extent: vii, 198 leaves : illustrations
Language: eng

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us