Academic literature on the topic 'SIM Cards'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SIM Cards.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SIM Cards"
Karsandh, Tarvinder, Nick Habgood, and Neil Stewart. "New initiatives on SIM cards." Card Technology Today 12, no. 6 (2000): 8. http://dx.doi.org/10.1016/s0965-2590(00)06012-6.
Full textAndersson, Jonas. "SIM cards – the new frontier for biometrics." Card Technology Today 21, no. 4 (2009): 10–11. http://dx.doi.org/10.1016/s0965-2590(09)70095-7.
Full textHarabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.
Full textCantika, Putri Talia, Gomal Juni Yanris, and Mila Nirmala Sari Hasibuan. "Analysis of Public Interest in Telkomsel Cards Using the Decision Tree Method." Sinkron 8, no. 2 (2023): 1181–95. http://dx.doi.org/10.33395/sinkron.v8i2.12371.
Full textRomero, Jocoh P. "Go and separate: a strategic intervention material (SIM) in improving the academic performance of grade 6 science pupils." Sapienza: International Journal of Interdisciplinary Studies 2, no. 4 (2021): 91–100. http://dx.doi.org/10.51798/sijis.v2i4.179.
Full textShoalihin, Shoalihin, Yeye Suhaety, and Atun Lestari. "Analysis of Public Interest in Smartfren SIM Cards using the K-Nearest Neighbors Method." International Journal of Science, Technology & Management 5, no. 5 (2024): 1207–12. http://dx.doi.org/10.46729/ijstm.v5i5.1184.
Full textTawanta Natalia Sembiring, Sri, Volvo Sihombing, and Deci Irmayani. "Analysis Of Public Interest In Smartfren SIM Cards Using The K-Nearest Neighbors Method." International Journal of Science, Technology & Management 5, no. 5 (2024): 1260–65. http://dx.doi.org/10.46729/ijstm.v5i5.1177.
Full textTawanta Natalia Sembiring, Sri, Volvo Sihombing, and Deci Irmayani. "Analysis of Public Interest in Smartfren SIM Cards using the K-Nearest Neighbors Method." International Journal of Science, Technology & Management 4, no. 5 (2024): 1260–65. http://dx.doi.org/10.46729/ijstm.v4i5.1185.
Full textBrzeziński, A., T. Dybicz, and Ł. Szymański. "Demand Model in the Agglomeration using Sim Cards." Archives of Civil Engineering 65, no. 1 (2019): 143–56. http://dx.doi.org/10.2478/ace-2019-0010.
Full textAl-Fayoumi, Mustafa A., and Nidal F. Shilbayeh. "Cloning SIM Cards Usability Reduction in Mobile Networks." Journal of Network and Systems Management 22, no. 2 (2013): 259–79. http://dx.doi.org/10.1007/s10922-013-9299-8.
Full textDissertations / Theses on the topic "SIM Cards"
Edsbäcker, Peter. "SIM cards for cellular networks : An introduction to SIM card application development." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13989.
Full textVilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.
Full textHassanzadeh, Reza. "A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37589/1/Reza_Hassanzadeh_Thesis.pdf.
Full textBolehovská, Zuzana. "Zkvalitnění služby GSM Banking pro zákazníky T-Mobile." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2007. http://www.nusl.cz/ntk/nusl-221413.
Full textOlofsson, Jonas. "Design and Implementation of SIM Functionality for TETRA-system on a Smart Card." Thesis, Linköpings universitet, Institutionen för systemteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-78597.
Full textMatějka, Jiří. "Útoky postranními kanály na čipové karty." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218248.
Full textLundberg, Therese, and Maja Orvarson. "Leverantörsrelaterade produktionsstörningar : en kvalitativ undersökning på Volvo Cars Uddevalla." Thesis, University West, Department of Economics and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-523.
Full textBarki, Amira. "Mécanismes cryptographiques conciliant authentification et respect de la vie privée dans le contexte du M2M." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2337.
Full textKalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textSiddiqi, Saad Ahmed. "Smart Card Packaging Process Control System." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100020.
Full textBooks on the topic "SIM Cards"
Loyd, Thomas Britt. An overview of the greeting card industry (SIC 2771). Division of Business Studies, Center for Research and Public Policy, University of Arkansas at Little Rock, 1987.
Find full textM, Lut͡s︡enko A., and Artemʹeva I͡U︡ V, eds. Peterburg v starykh otkrytkakh =: St. Petersburg in ancienf [sic] post-cards. Fert, 1993.
Find full text1947-, Gunnell John, ред. Antique car wrecks: From Old carʼs [sic] "Wreck of the Week" photo album. Krause Publications, 1990.
Find full textInternational Congress of Theoretical and Applied Mechanics (20th 2000 Chicago, Ill.). ICTAM: Selected papers from the 20th International Congres [sic] of Theoretical and Applied Mechanics held in Chicago, 28 August-1 September 2000. Swets & Zeitlinger, 2001.
Find full text(Thailand), Hō̜samut hǣng Chāt. Nāmpraphan nakkhīan Thai thī chai nai bat rāikān khō̜ng Hō̜samut hǣng Chāt =: Thai authors and their pen-names compiled from the cataloque [sic] cards of the National Library. 5th ed. Hō̜samut hǣng Chāt, Krom Sinlapākō̜n, 1986.
Find full textMetro Toronto Residents' Action Committee. Risks and dangers to the public in the operation of cabooseless trains in high-density urban areas: Introductory statemenent [sic] to the Railway Transport Committee of the Canadian Transport Commission, Hull, Quebec, October 6, 1986. M-TRAC, 1986.
Find full textConan, Doyle Arthur. The Adventures of Sherlock Holmes. Canterbury Classics, 2012.
Find full textBook chapters on the topic "SIM Cards"
Lin, Xiaodong. "SIM Cards Forensics." In Introductory Computer Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00581-8_17.
Full textCadonau, Joos, Danushka Jayasinghe, and Sheila Cobourne. "OTA and Secure SIM Lifecycle Management." In Smart Cards, Tokens, Security and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8_11.
Full textCadonau, Joos. "OTA and Secure SIM Lifecycle Management." In Smart Cards, Tokens, Security and Applications. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-72198-9_11.
Full textWaite, Gary, Keith Mayes, and Raja Naeem Akram. "Application Development Environments for Java and SIM Toolkit." In Smart Cards, Tokens, Security and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8_10.
Full textWaite, Gary, and Keith Mayes. "Application Development Environments for Java and SIM Toolkit." In Smart Cards, Tokens, Security and Applications. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-72198-9_10.
Full textYu, Songsen, Yun Peng, and Xiaopeng Huang. "Realization of Coordinative Control Between Multi Readers and Multi RF-SIM Cards Under Mobile RF-SIM Mode." In Computer Science and its Applications. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5699-1_27.
Full textMunch-Ellingsen, Arne, Anders Andersen, Sigmund Akselsen, and Randi Karlsen. "Customer Managed Security Domain on Mobile Network Operators’ SIM Cards: Opportunities to Enable New Business Models." In Xpert.press. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-43782-7_70.
Full textGaber, Chrystel, Gilles Macariot-Rat, Simona David, Jean-Philippe Wary, and Alain Cuaboz. "Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy." In Mobile, Secure, and Programmable Networking. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-52426-4_5.
Full textHassanzadeh, Reza, Tony Sahama, and Colin Fidge. "A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15515-4_11.
Full textZhou, Yuanyuan, Yu Yu, François-Xavier Standaert, and Jean-Jacques Quisquater. "On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_20.
Full textConference papers on the topic "SIM Cards"
Leng, Tao, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, and Cheng Huang. "GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00065.
Full textAggarwal, Ananya, and Kanwarpartap Singh Gill. "AI-Enhanced Security: The Future of Credit Card Fraud Detection." In 2024 International Conference on Intelligent Computing and Sustainable Innovations in Technology (IC-SIT). IEEE, 2024. https://doi.org/10.1109/ic-sit63503.2024.10862885.
Full textGoto, Daiki, Hayato Idei, and Tetsuya Ogata. "Computational Simulation of Wisconsin Card Sorting Task by using Variational Recurrent Neural Network based on the free energy principle." In 2025 IEEE/SICE International Symposium on System Integration (SII). IEEE, 2025. https://doi.org/10.1109/sii59315.2025.10870956.
Full textAlota, S., and M. Memmi. "Corrosion Mechanisms on Car Bodies after a Cyclic Accelerated Test Performed on an Experimental Road Circuit." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88353.
Full textKoshy, Deepu George, and Sethuraman N. Rao. "Evolution of SIM Cards – What's Next?" In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2018. http://dx.doi.org/10.1109/icacci.2018.8554774.
Full textKose, Busra Ozdenizci, Cem Cevikbas, Haci Ali Mantar, Onur Buk, and Vedat Coskun. "Design of a Secure Key Management System for SIM Cards: SIM-GAYS." In 2020 5th International Conference on Computer Science and Engineering (UBMK). IEEE, 2020. http://dx.doi.org/10.1109/ubmk50275.2020.9219504.
Full textSavoldi, Antonio, and Paolo Gubian. "Data Hiding in SIM/USIM Cards: A Steganographic Approach." In Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07). IEEE, 2007. http://dx.doi.org/10.1109/sadfe.2007.7.
Full textFeng, Xiaoling, Tianming Zhang, Yue Zhao, et al. "Malicious SIM Cards Identification Method Based on Telecom Big Data Analytics." In ICCDE 2020: 2020 The 6th International Conference on Computing and Data Engineering. ACM, 2020. http://dx.doi.org/10.1145/3379247.3379294.
Full textQuanle Li, Junwei Zou, and Xiaoying Zhang. "The E-bank digital signature solution based on PKI-SIM cards." In 2009 IEEE International Conference on Communications Technology and Applications (ICCTA). IEEE, 2009. http://dx.doi.org/10.1109/iccomta.2009.5349055.
Full textZidouni, Nabil, Salim Chitroub, Hakima Chebout, and Nesrine Boukais. "New safety measure to protect the 3G/4G SIM cards against cloning." In 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT). IEEE, 2018. http://dx.doi.org/10.1109/mownet.2018.8428876.
Full textReports on the topic "SIM Cards"
Gause, Ken E. North Korean House of Cards: Leadership Dynamics Under Kim Jong-un. Committee for Human Rights in North Korea, 2015. https://doi.org/10.69981/4725.
Full textBenkraouda, Ouafa, Lindsay Braun, and Arnab Chakraborty. Policies and Design Guidelines to Plan for Connected and Autonomous Vehicles. Illinois Center for Transportation, 2022. http://dx.doi.org/10.36501/0197-9191/22-012.
Full textHakizimana, Naphtal, and Fabrizio Santoro,. Technology Evolution and Tax Compliance: Evidence from Rwanda. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ictd.2024.038.
Full textAkbari, Chirag, Ninad Gore, and Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2319.
Full textMasuku, Phindile T., Ziyanda Dlamini, and Fabrizio Santoro. Understanding the Tax Payment Compliance of Companies: Evidence from Eswatini. Institute of Development Studies, 2025. https://doi.org/10.19088/ictd.2025.040.
Full textFinancial Stability Report - September 2015. Banco de la República, 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2015.
Full text