The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
App Store Analysis studies information about applications obtained from app stores. App stores provide a wealth of information derived from users that would not exist had the applications been distributed via previous software deployment methods. App Store Analysis combines this non-technical information with technical information to learn trends and behaviours within these forms of software repositories...
Software Defined Network (SDN) is an advanced approach to designing dynamic, manageable, cost-effective, and adaptable network architectures. SDN will play a key role as an enabler for 5G and future networks. Transferring network monitoring functions to a software entity working in conjunction with configurable hardware accelerators through a scheme called Software Defined Monitoring (SDM) is one...
Software startups can be subject to extreme money and time constraints while hoping for delivering reliable software. In a harsh startup environment, software may face quality downgrade either by improper process management or incapable human resources. Among the many, security is a fragile software quality characteristic responsible for severe negative consequences such as jeopardizing a startup's...
In this paper, we describe the need, requirements and challenges for implementing a global information grid. The grid connects all participating elements in a military mission and provides them with all mission-relevant information in a timely and secure manner, independent of the used command and control information systems (C2IS), the available communication technologies, the degree of mobility,...
The article touches aspects of security in Wireless Sensor Networks. It begins with a review and classification of existing types of threats and protection methods. The main part of the paper presents the results obtained during development of a threat detection system for WSN network. The described approach is based on a mobile platform which allows separation of security mechanisms and the software...
In today's life, the mobile phone is an essential device for the modern human. The people play installed games in the mobile device to pass the time and express emotions. However, stand-alone off-line game may not require internet connection but pro-longed use predisposes bored. Therefore, multiplayer on-line game meets the needs of groups of human activity. In the almost multiplayer on-line games,...
Method for increasing protection level of desktop PC type computer software application and user data using smartphone is proposed and presented in this paper. Smartphones are widely used, almost every person has one and manufacturers of smartphones offer wide range of the devices. All desktop computer applications for some particular and special purposes have applied some kind of protection. This...
Software development requires the protection of privacy. However, a body of knowledge does not exist for the development of privacy-aware software. Based on a literature survey, this paper introduces various studies that address knowledge regarding the development of privacy-aware software, and describes the current status and future direction toward building a knowledge base for privacy-aware software...
Recent technological advances have accelerated the design and worldwide deployment of mobile payment systems (m-payment). However, m-payment over open devices and networks poses security challenges of a new dimension that users disclose lots of sensitive information and privacy can't be protected properly in open environment. In this paper, we propose a mobile payment architecture employing with trusted...
This paper focuses on the compliance of publicly available specifications of Global System for Mobile communication (GSM) with the extremely closed GSM industry with the help of RTL-SDR, GNU Radio and Wireshark. GNU Radio is a free and open software which enables the translation of real-world systems to programmable flow graphs. GSM, together with other technologies, is part of the evolution of wireless...
Context based Mobile Information Catalog Surveillance is a mobile phone based communication application. This application will give the notification to the user whenever they want to communicate with their mobile virtually. This application proved to get the recent call logs details when you send a command as message to the Android mobile device. It is used on Business point of view surveillance and...
This demonstration presents a new and innovative open platform whose goal is to enable secure mobile applications. Secure Elements (SE) are hosted in dedicated servers, whose protocol (RACS) is detailed by an IETF draft. They are remotely used from mobiles via secure TLS channels. These channels are booted from TLS NFC (Near Field Communication) smartcards that are tapped against tablets equipped...
In only a few ten years payment systems have undergone an incredible evolution passing from a physical transfer of cash to transactions exchanging money as digital data. Mobile Payment (m-payment) refers to one type of electronic payment, performed through mobile devices, such as mobile phones, smartphones, and tablets. To ensure trust and avoid frauds severe security requirements must be imposed...
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this weakness has been abused using IMSI catcher. However, due to high prices there were no major opportunities for detailed IMSI catcher analysis and for a practical implementation of the IMSI catcher with lower costs and greater availability. Development of a software defined radio has enabled a cheaper implementation...
The intelligent device and mobile applications has been the growth rapidly. The mobile device and related applications has widely used increasingly. The security and compatibility concern for mobile application is mounting as well. This paper analyzed attributes of security and compatibility corresponding to mobile software testing. The software quality features for security and compatibility is given...
Today security concerns are on the rise in all areas such as banks, governmental applications, healthcare industry, military organization, educational institutions, etc. Government organizations are setting standards, passing laws and forcing organizations and agencies to comply with these standards with noncompliance being met with wide-ranging consequences. There are several issues when it comes...
Pay2you Places is a new system of payment based on Smartphones geo-location functionalities and on virtual purse. It is characterized by the lightweight of its required equipment. We just need to install an application on the cellular of the client to assure the payment from start to finish. As for the trader only a registration on the service and a configuration of the electronic payment terminal...
Mobile security is a main topic of concern for the enterprise. Corporate data stored in employees device post a potential security risk of getting lost, stolen or get accessed by unauthorized personal. There are many solutions in the market that addresses this issue. Most of these solutions revolve around applying stronger password, others make use of the encryption of either full or partial hard...
This minitrack focuses on the research and automation techniques that can be applied to mobile platforms to ensure that software developed for these devices is secure without compromising other system properties such as performance or reliability.
The mobile payment service is an important and popular service that attracts attentions. Number of mobile users is growing up every day. The users like to have more and more services ready on the wireless networks. Companies try to produce more smart phones while customers buy and use them. More smart phones mean a more proper infrastructure to use 2-dimensional barcodes (2D-barcodes) in mobile payment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.