The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The appearance of Mobile CSCW made people have much more understanding on Computer Supported Cooperative Work. With the help of Mobile CSCW, the efficiency of cooperative work has been improved,even some work has become viable what could not before. In this paper, we analyzed the characters and system model of Mobile CSCW, discussed the related developing technology and information security. Simultaneity,...
Certificate status verification is one of the most important parts in WPKI. Aimed at dealing with the problems of certificate status verification in the wireless environment, the paper puts forward a new method - OCSP of cache-based server agent OCSP request, which takes full use of the advantages of the current OCSP certificate status verification scheme, and can get the real-time status of the certificate...
This paper presents the results obtained in the development of a security mechanism for Web access control based on IEEE 802.11 mobile stations indoor location. The goal of the mechanism is to permit the control of the Web access made by students in an academic environment according to the classroom they are in. The access is controlled by a location server, which dynamically interacts with security...
The advances in wireless communication and mobile computing make new types of applications possible. In this context, userspsila navigation becomes one of the most popular applications. The existing approaches to compute a route are either server- or client-based. The first one computes the route on a server and sends back the result to the mobile device. The second one computes it directly on the...
This paper presents an authentication protocol in handoff for overlapping wireless networks security. Our ultimate goal is to find out the optimum solution which should provide best performance in terms of network parameters such as handoff latency and signalling overhead. The proposed protocol decreases the latency delay and the overhead of the network. The simulation results reveal that the proposed...
Along with the rapid development of mobile devices and widespread deployment of wireless networks, more and more content and service providers are increasingly interested in provide multicast applications over wireless networks. Before wireless group-oriented applications can be deployed in large scale, security must be guaranteed. Group key management is a critical issue in the wireless multicast...
The key technology of mobile value-added services is to design protocol, which can meet the poor computing power as well as being security. This paper proposes an Advanced-RPC protocol by adding hash function with key to the Lowe modified BAN concrete Andrew Secure RPC. The new protocol mends some undesirable properties in the old one, enhances forward security, and improves the running efficiency...
With the increase of mobile and wireless communication in heterogeneous networks, the need for security has also increased. Mobile devices have to execute seamless and secure handover from one type of network to another. But before the actual execution, some security measures needs to be taken against denial of service and replay attacks. These measures require lengthy procedures for authentication...
We analyze several mutual authentication and key exchange protocols (MAKEPs), and present a number of essential properties of the protocols for secure mobile communications. To address the weaknesses of existing protocols, we propose an improved version of MAKEP known as EC-MAKEP. Besides supporting the essential features present in the existing protocols, the proposed protocol also provides the user...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.