The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It is constructed based on the central idea of exploiting a safety management system on mobile terminal to further introduce the over all layout, different sorts of capacity and technology data base. The primary goal is to ensure the security of...
Searching for vulnerabilities in Android apps through approaches based on the app's dex bytecode has been applied to a lot of researches. This approach, called late detection, is applied to apps already released, and usually doesn't identify vulnerabilities before users have been exposed. This article presents a method based on static analysis with matching patterns for identifying these vulnerabilities...
Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information...
We propose Over-the-Internet (OTI), a novel system that manages secure element based applications. We demonstrate our solution in the context of NFC ecosystem and show that it can be effectively used for transmitting big applications to the secure element. Our system leverages the GlobalPlatform card specification as well as the GlobalPlatform user-centric ownership model. Our solution integrates...
With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring,...
Smartphones are becoming increasingly popular with a wide range of capabilities for the purpose of handling heavy applications like gaming, video editing, and face recognition etc. These kinds of applications continuously require intensive computational power, memory, and battery. Many of the early techniques solve this problem by offloading these applications to run on the Cloud due to its famous...
Taking full advantage of the availability of Cloud computing facilities, Mobile Cloud Computing (MCC) is becoming more and more popular as an element of mobile technology. This availability enables mobile users to use the cloud infrastructure to overcome the limitations of mobile technology, namely limited data storage, processing power and battery life. With the increasing use of mobile cloud computing,...
This minitrack focuses on the research and automation techniques that can be applied to mobile platforms to ensure that software developed for these devices is secure without compromising other system properties such as performance or reliability.
Mobile technology has already had a major impact on the financial industry. With the growing acceptance of mobile transactions, security issues require more attention. The proposed secured architecture for 2-party mobile payments (SA2pMP) was designed to satisfy the four properties of confidentiality, authentication, integrity and non-repudiation that are demanded by any secure system. As an extension...
Micro finance has a different approach than the regular financial service. Collection is made by account officer directly to customer. Service-Based Application is proposed to help the collection process. The system relies on web services and mobile application using Java ME as consumer. Dependability of the application is analyzed to meet the financial industry requirements. This article analyzes...
Mobile agents are used with an increasing trend in network security, QoS, routing, network monitoring and management applications. The platforms such as IBM Aglets, JADE, Mobile-C are commonly used in mobile agent applications. These platforms give support for only IPv4 networks. However, they don't support IPv6 networks. In this study, Mobile-C platform which was developed for IPv4 network structure...
Mobile devices have become ubiquitous, allowing the integration of new information from a big range of objects. But the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA protocols implementation for mobile devices using J2ME. The main value of JXME is its simplicity when creating peer-to-peer (P2P) applications on limited devices. However,...
Currently, NFC phones are coming in the handheld market, providing facilities to perform m-transactions. Obviously, this type of operation requires special security precautions. Indeed, a malicious code could intercept and hijack the system, even if there is a smart card. For example, the amount of the payment displayed in the terminal can be hijacked by an attacker to fool the user, or user's credential...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
Since wireless sensor networks are successfully deployed in real life scenarios, applications in medical health-care, structural control, homeland security etc. become feasible. In those envisioned applications, easy maintenance and usability become crucial to staff members, e.g., to doctors or nurses. Not only for widespread distribution of hundreds of sensors, but also in tele-medical applications,...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
AJAX applications provide new learning possibilities through its support to dynamic interaction, knowledge sharing, and collaboration. Developers should be weary of new insecurities introduced by these capabilities. The mobile industry in particular has not made better use of AJAX because of the complexities involved dealing with open source XMLized documents such as SVGs. Such documents are becoming...
Along with the rapid development of 3rd generation mobile communication technologies, the applications of M-Commerce have been greatly expanded. Based on the research and analysis of the J2ME platform, this paper proposes a secure architecture for M-Commerce systems under the 3G networks. The proposed solution is the combination of J2EE and J2ME capabilities based on the three-tier architecture, as...
This paper seeks to integrate different impressive access technologies to build a kind of innovative mobile business model. It analyzes the requirements of mobile business in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile business solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for...
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation. In order to effectively protect digital assets with copyrights?? against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances. The paper proposed three...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.