Tuesday, November 21, 2017

Facebook fundraiser refund receipt

Hi xxx,
We wanted to let you know that your donation of $xx.xx to the fundraiser Raising Money for Devastating Iran’s Earthquake was refunded and will be deposited into PayPal xxx@xxx.xxx. Please note that it may take your bank a few business days to deposit this payment into your account.

Unfortunately, we can't allow fundraisers that appear to be intended to send funds into a country that is subject to comprehensive sanctions. Additionally, to raise money for a nonprofit on Facebook, we require people to select from a specific list of authorized nonprofits to ensure authenticity and security. This fundraiser is therefore ineligible to receive funds.

xxx, we value the generosity you've shown to this fundraiser and know this cause is important to you. Since we are unable to direct your donation through this fundraiser, Facebook is making a donation on your behalf to GlobalGiving for the full amount that this fundraiser generated, which will further distribute the funds to licensed organizations working in the area.

Thank you for being part of our fundraising community.

Thursday, November 09, 2017

List done by 2017

Behavioral Analog Topology Synthesizer
Optical CDMA Network Simulator (OCNS)
Extended Authentication and Key Agreement Protocol
Secure Multipath Adaptive Routing Protocol
Authentication and Key Agreement Protocol in 4G
Risk of attack coefficient effect on availability of adhoc networks
Game-theoretic model to mitigate packet dropping
Multi-dimensional correlation steganalysis
SVD and Noise Estimation based Image Steganalysis
Eigenvalues-based LSB steganalysis
Security Weaknesses in PGP Protocol
Performance Modeling and Optimization of MapReduce
Image Steganalysis of Low Rate Embedding in Spatial Domain
Modeling and Optimization of Straggling Mappers
Blind detection of low-rate embedding
Big Data Computing: Modeling and Optimization
Towards Stochastically Optimizing Data Computing Flows
Optimal Placement in Network On-Chip
Optimal Scheduling in Parallel Programming Frameworks
Node Architecture and Cloud Workload Characteristics Analysis
Thumbnail Generation by Smart Cropping
Stochastic Modeling and Optimization of Stragglers
Chinese Academy of Sciences
Vanishing Point Detection in Photo Composition Analysis
Aesthetic Rating for Photos
Shape matching for automated bow echo detection
Detecting Dominant Vanishing Points in Natural Scenes
Skeleton Matching for Severe Weather Detection
Discovering Triangles in Portraits and Landscapes
Leveraging big visual data to predict severe weather
IAAP Scholarship Award
Deep-learned Models and Photography Idea Retrieval
Maryam Mirzakhani, the mother who won Fields Medal
Calculate AT&T Shares in a Shared Data Plan
Travel Grant from CSE Department

Friday, October 20, 2017

US 9461993 B2

System and methods for UICC-based secure communication US 9461993 B2
System and methods for uicc-based secure communication US 20150222631 A1

A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.

1"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Universal Subscriber Identity Module (USIM) application", Release 11, 2012.
2"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Remote APDU Structure for (U)SIM Toolkit applications", Release 10, 2012.
3"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications", Release 10, 2012.
4"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; UICC-terminal interface; Physical and logical characteristics", Release 10, 2011.
5"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Universal Subscriber Identity Module (USIM) Application Toolkit (USAT)", Release 11, 2012.
6"GlobalPlatform Card Confidential Card Content Management Card Specification v2.2-Amendment A", 2011.
7"GlobalPlatform Card Contactless Services Card Specification v2.2-Amendment C", 2012.
8"GlobalPlatform Card Remote Application Management over HTTP Card Specification v2.2-Amendment B", 2012.
9"GlobalPlatform Card Security Upgrade for Card Content Management Card Specification v 2.2-Amendment E", 2011.
10"GlobalPlatform Card Specification", Version 2.2.1, 2011.
11"GlobalPlatform Card Technology Secure Channel Protocol 03 Card Specification v 2.2-Amendment D", 2009.
12"GlobalPlatform Device Secure Element Remote Application Management", May 2011.
13"GlobalPlatform Device Technology Secure Element Access Control", Version 1.0, May 2012.
14"GlobalPlatform Device Technology TEE System Architecture", Dec. 2011.
15"GlobalPlatform Key Management System", Functional Requirements, Nov. 2003.
16"GlobalPlatform System Messaging Specification for Management of Mobile-NFC Services", Feb. 2011.
17"Over-The-Air Platform Security Review", Mandiant Intelligent Information Security, 6 pgs., Aug. 17, 2010.
Farhat, Farshid, Somayeh Salimi, and Ahmad Salahi. "Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup" IACR Cryptology ePrint Archive 2011 (2011): 45.
19"Reprogrammable SIMs: Technology, Evolution and Implications", csmg, Sep. 25, 2012.
"Secure Authentication for Mobile Internet Services"-Sim Alliance, Dec. 2011 http://simalliance.org/wp-content/uploads/2015/03/12-01-01-WP-SIMallianceSecureAuthentication-EN-V1.1.pdf.
21"Smart Cards; Card Application Tookit (CAT)", Release 11, 2012.
22"Smart Cards; ETSI numbering system for telecommunication application providers", Release 11, 2011.
23"Smart Cards; Machine to Machine UICC; Physical and logical characteristics", Release 9, 2011.
24"Smart Cards; Remote APDU structure for UICC based applications", Release 11, 2012.
25"Smart Cards; Secured packet structure for UICC based applications", Release 11, 2012.
26"Smart Cards; Security mechanisms for UICC based Applications-Functional requirements", Release 8, 2008.
27"Smart Cards; UICC Application Programming Interface (UICC API) for Java Card(TM)", Release 9, 2012.
28"Smart Cards; UICC Application Programming Interface (UICC API) for Java Card™", Release 9, 2012.
29"Smart Cards; UICC-Terminal Interface; Physical and logical characteristics", Release 10, 2011, 179 pages.
30"The OTA Platform in the World of LTE", 14 pgs., Jan. 2011.
31"Universal Mobile Telecommunications System (UMTS); UICC-terminal interface; Physical and logical characteristics", Release 10, 2011.
32Chen, "An efficient end-to-end security mechanism for IP multimedia subsystem", Computer Communications, 2008, vol. 31.18, pp. 4259-4268.
33Dodson, Ben et al., "Snap2Pass: Consumer-Friendly Challenge-Response Authentication with a Phone", http://prpl.stanford.edu/papers/soups10j.pdf, Apr. 30, 2010.
34Global Platform, "Secure Element Remote Application Management", Version 1.0, May 2011.
35Imhontu, et al., "A survey on near field communication in mobile phones & PDAs", Dissertation Halmstad University, 2010. http://hh.diva-portal.org/smash/get/diva2:385433/FULLTEXT01.
36Kim, Jong-Min et al., "A Study of Coupons issuance System Considering of User Convenience Based on NFC", 3rd International Conference on Computer Science and Information Technology (ICCSIT'2013) Jan. 4-5, 2013 Bali (Indonesia). http://psrcentre.org/images/extraimages/113118.pdf.
37Kounelis, Ioannis et al., "Secure Middleware for Mobile Phones and UICC Applications", Mobile Wireless Middleware, Operating Systems, and Applications, Springer Berlin Heidelberg, 2012, 143-152.
38Kounelis, Ioannis et al., "Security of service requests for cloud based m-commerce", MIPRO, 2012 Proceedings of the 35th International Convention, IEEE, 2012.
39Meyerstein, et al., "Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications", InterDigital Communications Corporation LLC, First International ICST Conference: MobiSec 2009, Security and Privacy in Mobile Information and Communication Systems, p. 214-225, Jun. 3-5, 2009.
40Nagalakshmi, et al., "Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys", Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011, pp. 376, 381.
41Zhang, et al., "Cryptographic Key Agreement Protocol Simulation", Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, 2010, pp. 418, 419.

Monday, October 02, 2017

You have 30 days left to download your iCloud Photo Library.

New Message from iCloud!
It seems that they have fixed the backup storage issue ... No more storage full message ... but the new iCloud Photo Library wants to be enabled ... :-D

Dear ... ...,

iCloud Photo Library has been disabled on all your devices and new photos and videos are no longer uploading to iCloud.
There are currently 122 photos and 2 videos in your iCloud Photo Library
Original format, full resolution versions of your photos and videos are not stored on your devices. You must download your full resolution photos and videos to at least one device before they are deleted from iCloud Photo Library in 30 days.
To download your photos and videos to an iPhone, iPad or iPod touch with iOS 8:
1.Connect to a power source and Wi-Fi.
2.Go to Settings and tap iCloud, then select Photos.
3.Tap Download and Keep Originals.
If your library exceeds the storage space available on your device, you can download your photos and videos to your Mac or PC from iCloud.com.
If you do not want iCloud Photo Library turned off, you can turn it right back on your iOS device:
1.Go to Settings and tap iCloud.
2.Select Storage and tap Manage Storage.
3.Select iCloud Photo Library and Undo Delete.
The iCloud Team