The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People make more and more use of digital image acquisition devices to capture screenshots of their everyday life. The growing number of personal pictures raise the problem of their classification. Some of the authors proposed an automatic technique for personal photo album management dealing with multiple aspects (i. e., people, time and background) in a homogenous way. In this paper we discuss a...
GPRS offers the user can always on connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents from a company's Intranet to an employee. It is important to have strong focus on the security, so companies and persons that demand high level of security can take advantage of the...
The fast growing number of social-network services utilising location information has also increased the interest in privacy for such systems. Many interesting ideas and proposals have appeared. One of the most interesting is perhaps the notion of minimising asymmetry of information flow. This idea can also be applied in the area of ambient assisted living. The work described here reports on some...
Security-by-Contract (S??C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S??C enriched with an automatic trust management infrastructure. Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing. At deploy-time, our system decides the run-time configuration depending on the...
In order to meet the greater than ever before integration and consolidation needs, enterprises are migrating towards SOA-based models. Besides, driven by the dissemination of more refined mobile devices in the enterprise, and the rapid growth of wireless networks based on IEEE 802.11 WiFi Standards, mobile applications have been increasingly used in mission-critical business applications. The SOA-based...
Technological advances in wireless networks and mobile devices are driving towards a new concept of grid computing, in which mobile users play an active role. For this reason, classical wired grid infrastructures are being extended in order to provide facilities which enable mobile users to exploit services available in the environment. Since grid computing borrows such facilities from pervasive computing,...
In 2004, Bresson et al. proposed an authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are insecure against the so-called impersonation attacks. This paper proposes a mutual authenticated group key agreement protocol based on RSA, discrete logarithms (DL) and...
Remarkable wireless networks technology developments have made us to expect the realization of new applications like the advanced traffic system, the disaster prevention system, and the adhoc network system. However the resources of wireless bandwidths are not enough to use for such new applications because it is not efficient usage. Therefore, it is necessary to develop with new efficient wireless...
This paper presents a self-guided tour system that allows a visitor to instantly share his/her notes or remarks about exhibits with others through the Internet. The note/remark not only can be stored with the exhibit information to be accessed by other visitors, but also can be broadcasted through microblogging in a timely manner. This provides an interaction mechanism for the visitor to feedback...
In recent years, RFID (radio-frequency identification) system has widely used owing to its convenient and efficiency in many applications. In this paper, we propose a novel scheme that the market membership can use the mobile reader to query products information and make a secure transaction through cash register. There also can use the accumulated digital coupon to redeem prizes with the server....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.