The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Marketing is a powerful means to grow business. Tremendous increase in the count of mobile users has motivated the mobile marketing to high level in the last several years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted major attention of mobile users and the businessman now a days. Signal Processing is used to get latitude and longitude of...
Near field communication is on the verge of broad adoption worldwide as the NFC controllers and Secure Elements (SEs) are now commonplace components in many models of smart phones and point of sale devices currently available in the market. The combination of NFC and smart devices are making the way of life more easier for millennials. Data aggregation is a common phenomena in any e-commerce method...
This paper analyzed the shortages of S/KEY OTP system in mobile commerce identity authentication and suggested an improved one-time password system based on bidirectional virtual authorization in mobile application systems. On one hand, this suggestion can reduce the calculation stress of both client and server, accordingly increases the efficiency of authorization and withstands the DoS attack. On...
To increase the agility of the chain store operation with the information technology, the communication system is proposed with the mobile networks to link the headquarters with the chain stores distributed widely. In the store, the mobile is attached to POS with USB, and the data exchanging service is developed on the mobile to report the sale data and to download the updated data. At the headquarters,...
Under the premise of fully analyzing the security requirements and security threats of mobile payment, the analysis of secure mobile payment based on SET protocol in the WAP environment has been made, then, this paper points out its various flaws exist in the transaction process. Meanwhile, making improvements on the basis of the original Mobile Payment based on SET protocol, then proposed Mobile...
Currently, several researches have concentrated on the new or vital security requirements of mobile commerce. However, some recent studies asserted a particular serious attack, called wormhole attack, that mainly targeting in a wireless-based system may also occur in the mobile commerce systems. Although there are many endeavors to confront wormhole attacks in the field of wireless communications,...
Ubiquitous multimedia applications are becoming more and more popular. However, the solutions that confirm content and interaction security in these applications are still open issues because of various network convergences and device interconnections. This paper investigates a ubiquitous multimedia scheme and proposes a secure service solution. In the ubiquitous scheme, the multimedia content is...
The efficiency of marketing campaigns is a precondition for business success. This paper discusses how Bluetooth technology transfers the content of advertisement and collects market research information at the same time. Conventional advertisement media were enhanced by devices to automatically measure the number, distance, frequency and exposure time of passersby, making information available to...
Even before the birth of the digital age, content producers and copyright holders had artistic, financial, and legal demur to copying technologies. Nowadays, the huge amount of digital media has only increased the scope of their concerns. As premium content is starting to be offered in the mobile market, the question arises what kind of strategy to follow regarding mobile Digital Rights Management...
In recent years, mobile commerce has been gaining increasing popularity as a new business activity. Along with the wide use of the 3G, the mobile commerce will become even better than traditional electronic commerce. The studies and use in the area of dual-mode electronic commerce will be a short cut to the electronic commerce enterprises which went into the area of mobile commerce. The key technologies...
Agent technology is used in e-commerce security in the perspective of distributed artificial intelligence in the paper and is researched in combination with e-commerce security technology. A multi-agent e-commerce and security system with four-layer system structure, improved password tracking method and dynamic load function is put forward, designed and realized by using agent technologypsilas own...
New advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Mobile payment, in which mobile customers use their phones for performing financial transactions, is a promising and exciting domain that has been rapidly developing recently. Although different mobile...
The presented mobile DRM are short of an efficient payment protocol to guarantee that participants can engage in the exchange without the risk of suffering a disadvantage. Even the latest DRM standard of the open mobile alliance (OMA) did not give a detailed transaction scheme in mobile DRM. In general, the fair payment approaches in mobile DRM rely on the service of an external trusted third party...
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the...
In response to the low efficiency problem in the existing authenticated key exchange protocol for mobile commerce, the paper proposes an efficient authenticated key exchange protocol based on token, which can authenticate identity of the mobile user in the foremost time, as well as the session key can be exchanged efficiently. To analyze the proposed protocol, the paper proposes an extension of the...
A main concern in the public key distribution is the authenticity of the public key. Authenticating public keys provides assurance to the entity that the received public key corresponds to the sender's identity. A typical approach to guarantee the authentication of the public key holder relies on a trusted agent named Certificate Authority (CA). The signature based CA binds entity's identity ID to...
There have been 220 million mobile phone users and numerous PDA in our country at the moment, these mobile terminals form the huge potential market of mobile e-commerce which will be the development trend of future e-commerce. Compared with traditional mediums of payment, using mobile terminals, such as mobile phone and PDA, etc to carry out transactions and payments will be more flexible and convenient...
Rapidly development of mobile-payment application is dues to the combination of mobile communication and Internet. The combination of J2ME and J2EE technology provides a good solution for mobile- payment. The characteristics of J2ME and J2EE is researched based on mobile- payment platform, and a whole series of solutions are proposed, these solutions can be applied into mobile commerce system of passenger...
The third generation mobile systems will be set up in the future not far in China, there are a number of challenges in the mobile e-business of small and medium-sized enterprises (SME). To address this, we present the mobile e-business solution that is enhanced by using external electronic security key and special authentication protocols. Furthermore, we have developed a textile foreign trade mobile...
Short message service (SMS) will play a very vital role in the future business areas whose are popularly known as m-commerce, mobile banking etc. For this future commerce, SMS could make a mobile device in a business tool as it has the availability and the effectiveness. The existing SMS is not free from the eavesdropping, but security is the main concern for any business company such as banks who...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.