The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
An improved ant colony algorithm is proposed in the actual storage environment on the basis of safety and stability. Keeping the omni-directional mobile vehicle away from obstacles is concerned first in order to reduce the risk of collision in consideration of the car size and the diversity of the obstacle species. Then, redundant points are simplified in the path and fewer inflection path is filtered...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It is constructed based on the central idea of exploiting a safety management system on mobile terminal to further introduce the over all layout, different sorts of capacity and technology data base. The primary goal is to ensure the security of...
Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the...
The purpose of this paper is to illustrate the Internet of Everything based integrated security system designed for World War One commemorative Museum of Fogliano Redipuglia in Italy, capable of ensuring visitors security, cultural heritage préservâtion/protection and great usability for visitors, with particular reference to visitors with disabilities. Genetic Algorithms (GAs) have been used to design...
With the rapid development of the Internet, the application of Android system is more and more widely. But then the user's privacy leaks, malicious software attacks and hacking and other security issues have become increasingly serious. Android privilege mechanism is an important security protection mechanism of Android. But the current authority mechanism cannot be a good solution to the problem...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
With the expanding application of the two-dimensional barcode, the harmfulness of malicious URLs is much more serious. For preventing malicious URLs of two-dimensional barcode, this paper proposes a detection method -- H-SBH which is utilizing hash function. Firstly, the detection system extracts eigenvalues of malicious and benign URLs by H-SBH, then builds black and white lists library based on...
Smartphones and tablets have become important in daily life as they provide a convenient and mobile means to seek, access and share information. This convenience carries a downside in the rising concern with mobile security. Conveying the importance of personal digital security is notoriously difficult with adult users and perhaps more so for users who are children. Children are avid consumers of...
IBM IOC (Intelligent Operations Center) is a high potential computational platform with an exponential growth margin, that can be applied in many areas dealing with efficiency and smarter city development, by assisting its daily needs, along with the organization of large scale Festivities. In this work we present the application of this platform to Festa dos Tabuleiros (Trays Festival), which takes...
Nowadays, efficient communication technologies are of paramount importance to provide effective and reliable emergency management systems. New wireless communications engineering approaches and value-added services could lead to great benefits, improving situational awareness and enhancing life-saving capabilities. For these reasons, governments and organizations involved in public safety and security...
Mobile medical apps (MMAs) work in close loop with human physiology through sensing and control. As such it is essential for them to achieve intended functionality, without having harmful effects on human physiology, affecting the availability of the service and compromising the privacy of health data. However for a mobile app manufacturer, generating evidences regarding safety, sustainability and...
Among the Organized crime, Human trafficking hold third place where as the first and second or drug and weapon trade across the globe. Human trafficking is a shame on Humanity. As per the report of Human Rights commission of India over 40,000 children are reported missing every year of which 11000 are untraced [1][2]. Another statics report saying 80% of human trafficking is done for sexual exploitation...
In today's world, people using smart phones have increased rapidly and hence, a smart phone can be used efficiently for personal security or various other protection purposes. The heinous incident that outraged the entire nation have waken us to go for the safety issues and so a host of new apps have been developed to provide security systems to women via their phones. This paper presents Abhaya,...
The vision of the Fifth generation (5G) of mobile communication is that it will be an umbrella for communications for various vertical industries that have different requirements for delay, data rates, reliability, availability, and security. 5G will not be a single technology — rather a convergence of not just new revolutionary technologies, but of the already existing, and evolving technologies...
Mobile social networks (MSNs) are specific types of social media which consolidate the ability of omnipresent connection for mobile users/devices to share user-centric data objects among interested users. Taking advantage of the characteristics of both social networks and opportunistic networks (OppNets), MSNs are capable of providing an efficient and effective mobile environment for users to access,...
Individual Security is a major concern in both developed as well as developing countries. There are various ways in which an individual can assure his/her safety, one of the ways being mobile applications. We compared various security mobile applications and analysed user's opinions about ‘Security through Mobile Applications’ through survey[1]. Studying the problems, constraints and importance of...
In this paper, we discuss about a futuristic design for multi-level connectivity that plays the pivotal role in enabling IoT services employing the hyper-convergent SmartX Boxes.
With the pervasive use of smart mobile devices and increasing wireless networking technologies, collaborations among mobile users are becoming deeper and ubiquitous. Appropriate task collaborations among mobile users could effectively improve the network processing ability with so called ‘mobile cloud’ or ‘cloudlet’. However, task allocations confront with the security issues. The possible collusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.