The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involved with BYOD should think carefully about the risks as well as the rewards.
As mobile devices continue to grow in popularity and functionality, the demand for advanced ubiquitous mobile applications in our daily lives also increases. This paper deals with the design and implementation of HASec, a Home Automation and Security system for mobile devices, that leverages mobile technology to provide essential security to our homes and associated control operations. In particular,...
Shoulder-surfing, phishing and keylogging are widely used by attackers to obtain users' sensitive credentials. In this paper, we propose a framework to strengthen password authentication using mobile devices and browser extensions. This approach provides a relatively high resilience against shoulder-surfing, phishing and keylogging attacks while requires no change on the server side. A prototype implementation...
Smart phones of today have increasingly sophisticated software. As the feature set grows further, the probability of system security related defects is likely to increase as well. Today, the security of mobile platforms and applications comes under great scrutiny as they are getting widely adopted. It is therefore crucial that code for mobile devices gets well tested and security bugs eliminated where...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
We explore the use of a hybrid and networked system for medical applications. In particular we are interested in monitoring the physiological data of newborn babies. The key element in our design is the use of cell phones as aggregating devices for the sensor collected information. Cell phones in particular enable secure communications with medical wireless sensors. We discuss a key distribution scheme...
Intrusion detection systems are deployed on hosts in a computing infrastructure to tackle undesired events in the course of usage of the systems. One of the promising domains of applying intrusion detection is the healthcare domain. A typical healthcare scenario is characterized by high degree of mobility, frequent interruptions and above all demands access to sensitive medical records by concerned...
As mobile phone brings great exchanges to our life, there are more and more information security problems. The uniqueness and security of fingerprint make it possible to be applied to identification of mobile phone. By analyzing the Atrua-Wing algorithm defects, the paper proposes optimal algorithm which adds matching limits to the input template. This optimal algorithm can ensure that the template...
The number of users of mobile devices has increased enormously over the past five years. Along with this, the public concern about how to make sure personal information remains private and safe has also grown, and it has become a high priority standard for mobile device producers to fulfill. Programming languages, by themselves, offer a limited safely, unfortunately. A common example is the use of...
With the increasing prevalence of mobile devices, there is an increasing risk that the mobile networks may be targeted by information warfare attacks. An investigation of mobile security issues from an information warfare perspective, with emphasis on computer network warfare and electronic warfare, is presented. The paper focuses on analysing prior cases of mobile security breaches from an information...
We propose a new authentication method based on identifying the ownership and location of the mobile devices. It can be assumed that the majority of the authenticating users will have a cellular device, a personal data assistant (PDA), or a smart phone device and, therefore, such devices are prime candidates to be used as another form of secondary authentication device. The proposed system uses the...
ID (identification) cards are used for proving the identity of each person. In many cases, the ID card is realized by using an IC plastic card. The student ID (identification) card is used for proving the studentship of each student in a college or a university. This paper proposes a method to realize a student ID electronically on the screen of a cell phone. The original student ID data are stored...
No doubt, the usages of mobile agent and mobile phone technologies are rapidly increased. The mobile agent has a promising room in the industry area. Unfortunately, this technology faces some security problems from mobile agents and hosts sides. This paper proposes a new model to protect Hosts (Service Providers) from malicious mobile agents. The main idea behind the model is to generate a secure...
Wireless access to the Internet is widely available in the world when terminal device roaming. Besides of buying merchandises, it also provides immediate access to up-to-date movie listings and news; anywhere-anytime access to e-mail; or the ability to check out a Web site while traveling. So concept of mobile e-commerce (m-commerce) should be replaced by mobile e-business (m-business), which will...
Since the launch of iPhones in 2007, smartphones become very popular these days. Because of their small sizes and high mobility, smartphones are easily lost or stolen. When people lost their smartphones, they are worried the private data stored in the phones may be revealed to strangers. This research proposes a novel approach for mobile data protection. Mobile usage data is first collected and usage...
JXME is the JXTA protocols implementation for mobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default...
Smart cards have been proliferated into many aspects of modern life. Historically, the ownership of smart cards has remained with the smart card issuers. Although this ownership model is favored by a wide range of industries and service providers, it does not provide optimum convenience and flexibility to cardholders. One potential solution could be to shift the control of smart cards from the smart...
Security-by-Contract (S??C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S??C enriched with an automatic trust management infrastructure. Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing. At deploy-time, our system decides the run-time configuration depending on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.