Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael V. Meyerstein is active.

Publication


Featured researches published by Michael V. Meyerstein.


IEEE Vehicular Technology Magazine | 2009

Trust in M2M communication

Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Andreas Leicher; Michael V. Meyerstein

Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. M2M communication applications and scenarios are growing and lead the way to new business cases. Because of the nature of M2M scenarios, involving unguarded, distributed devices, new security threats emerge. The use case scenarios for M2M communication also address the new requirement on flexibility, because of deployment scenarios of the M2ME in the field. We believe that these new requirements require a paradigm shift. One important pillar of such a shift will be a new, more balanced mix of device-centric trust and traditional enforcement of security properties.


Archive | 2009

Method and Apparatus For Enabling Machine To Machine Communication

Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Michael V. Meyerstein


Archive | 2010

Platform validation and management of wireless devices

Andreas Schmidt; Andreas Leicher; Inhyok Cha; Yogendra C. Shah; Sudhir B. Pattar; Dolores F. Howry; David G. Greiner; Lawrence Case; Michael V. Meyerstein; Louis J. Guccione


Archive | 2009

Universal integrated circuit card having a virtual subscriber identity module functionality

Inhyok Cha; Andreas Schmidt; Yogendra C. Shah; Michael V. Meyerstein


Archive | 2010

Secure remote subscription management

Michael V. Meyerstein; Yogendra C. Shah; Inhyok Cha; Andreas Leicher; Andreas Schmidt


Archive | 2011

Identity management on a wireless device

Andreas Schmidt; Michael V. Meyerstein; Andreas Leicher; Yogendra C. Shah; Louis J. Guccione; Inhyok Cha


Archive | 2010

Method and apparatus for H(e)NB integrity verification and validation

Sudhir B. Pattar; Inhyok Cha; Andreas Schmidt; Andreas Leicher; Yogendra C. Shah; Dolores F. Howry; David G. Greiner; Lawrence Case; Michael V. Meyerstein; Louis J. Guccione


Archive | 2011

Machine-To-Machine (M2M) Call Flow Security

Inhyok Cha; Michael V. Meyerstein; Lawrence Case


Archive | 2016

Method for enabling machine to machine communication

Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Michael V. Meyerstein


Archive | 2013

Methods and systems for authenticating a user of a wireless unit

Vinod Kumar Choyi; Yogendra C. Shah; Michael V. Meyerstein; Louis J. Guccione

Collaboration


Dive into the Michael V. Meyerstein's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andreas Leicher

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Andreas Leicher

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge