The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we aim to shed some light on the benefits and challenges brought about by using biometrics for securing mobile payments. Some potential solutions to address the challenges are also proposed and analyzed. Based on our analysis, it is shown that biometric cryptosystems are the suitable choice for providing security protection to biometric templates and enabling a seamless integration...
When a catastrophic natural disaster occurs, the efficiency of disaster response operation is crucial to life saving. However, communication systems, such as cellular networks, usually crashed due to various causes that make coordination difficult for many disorganized disaster response workers extremely. Unfortunately, rapid deployment of many existing emergency communication systems relies on a...
As the mobile embedded products developed, the power management has becoming an important technical specification. To some extent, it has been the organic composition of the mobile embedded products. In this project, it has realized the WM8350 charge driver based on WinCE6.0, which can supply power for any mobile embedded products by USB, power adapter or other ways.
Spatial cloaking has been proposed and studied to protect mobile user privacy when using location based services (LBS). Traditional spatial cloaking methods are carried out by a trusted proxy known as location trusted server (LTS) to generate a region that contains at least k users for every request. The LTS is assumed to know the location of all users at all times, and perform the cloaking for all...
Protecting privacy of mobile users of location-based services is a currently interesting research problem. Most protection techniques can be categorized into either those providing location privacy or those guaranteeing k-anonymity. A mobile user (i) has location privacy if, when he makes an LBS request, adversaries cannot tell his location precise enough to cause privacy concerns, and (ii) has k-anonymity...
Providing handover with guaranteed QoS for realtime multimedia service such as VoIP, video/audio streaming, and video conferencing in wireless LAN is a challenging task. In this paper, we present a context-aware mobility management mechanism in wireless LAN, which can provide fast handover with guaranteed QoS for real-time multimedia service. To this end, the scanning period and the number of channels...
With a rapidly changing channel in mobile communications, there is a scarcity of data samples, posing a challenge to reliable system identification. To address the problem, this paper presents a low complexity frequency-domain approach to blind single-input multiple-output (SIMO) system identification. The proposed approach is straightforward in concept and takes advantage of the computational power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.