The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
The goal of this paper is to propose and describe the development of an actual unified messaging and mailing solution, which is a mobile-based universal inbox application for Symbian Sixty Series phones, integrating access to all previous and new Short Message Service, Multimedia Message Service, and email messages. The general aim of the application is to intensify the message access capabilities...
This paper describes an interactive social agent platform which examines anthropomorphic robot features in the mobile phone usage context. Our system is smart phone based robot agent that operates on a mobile network and co-located ad-hoc networks. It helps remote users communicate interactively with each other through the robotic interface which utilizes facial expressions and body gestures. In this...
This work proposes the use of a weighted Finite State Machine to serve as a computational model for analyzing the performance of communication protocols. The new model's use is demonstrated by concentrating on web-based services, Internet level-5 protocols in particular, because when the latter are ported onto mobile handsets, fail to meet performance expectations. The same modeling technique can...
Usability and user interfaces play a huge and important role in todaypsilas mobile application. Besides a good design, acceptable performance, scalability, and robustness, a mobile application needs to be easy to use and, to some extent, customizable. To create a system able to custom the mobile applicationpsilas user interface and mirror it immediately to final users is the purpose of this article...
Identity authentication is the first line of defense in the security application system to access the mobile network resources. However, as the means of attacking become variety, new requirements have been brought forward for the technology of identity authentication. To improve performance of mobile authentication, this paper presents a novel mobile authentication scheme, which transmits message...
The paper compares the performance of different traditional mobile payment service concepts with a state of the art NFC-based mobile payment solution. The goal is to evaluate the different mobile payment concepts, not their software implementation, from a performance and end-to-end service duration time point of view. Overall, there have been five different mobile payment services developed, implemented...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
IP multimedia subsystem was introduced by the third generation partnership project (3GPP) to enable 3G mobile systems to provide ubiquitous cellular access to all the services that the Internet provides, with improved quality of service, appropriate charging and integration of services. For users to access the IMS services, IMS capable User Equipments are required. In this paper we present an IMS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.