The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objectives of the study were to find ways to enhance IPTV. The trend now is with context-aware personalised services. The study first explained the basics of IPTV, and then discussed the concerns and issues with current implementations. Next definitions of contexts, identity, profiles, roles and personalisation were introduced and the concept of context-aware personalised IPTV was described. The...
Mobile users need to have access to internal resources on their enterprise or home network from remote locations in an efficient but secure way. Currently, such a secured access is realised with Virtual Private Network (VPN) connections. Although operational, the current VPN solutions suffer of severe limitations. Most of the VPN solutions are not sufficiently secured since they are using weak authentication...
Future mobile environments will consist of various network systems that compete to offer services to mobile users. The challenge for the mobile user is to discover the available services and to select the desired services since similar services can have different names and services with same name can be totally or partially different. Furthermore, the service discovery must be accomplished in minimum...
To be able to access services in a seamless way across different physical access networks is compelling. The seamless handover features and availability of the mobile voice telephony service is by far the most important key to success in current mobile telecommunication services. As mobile devices are becoming multi-modal, i.e., supporting several physical network access technologies, there has been...
This paper describes thoroughly an authentication solution that is adequately strong, user-friendly and cost efficient. The idea is to use the mobile phone and its SIM (subscriber identity module) as an authentication token in the authentication of the user for all Internet applications. The proposed solution is generic and offers authentication for any Internet applications on any devices connected...
The paper presents current IMS client frameworks, and points out shortcomings of these for deployment in a mobile-fixed convergent multi-access IMS environment. Based on this analysis, a new IMS client framework is proposed. A prototype implementation is also presented.
The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. This paper presents the authentication schemes dedicated for fixed IMS clients. Such schemes are necessary in order to extend the usage of IMS to fixed environments. Authentication solutions for other applications than the IMS...
Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms, and if Internet services could use...
In process of networks convergence traditional network management systems have been replaced by variety of standards. Also, new principles of management have been emerged. Regarding to these changes new alternative network management techniques is needed. There are a lot of efforts in management protocols improvement based on advanced computer simulation techniques. But, there is a lack in development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.