The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices have become ubiquitous, allowing the integration of new information from a big range of objects. But the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA protocols implementation for mobile devices using J2ME. The main value of JXME is its simplicity when creating peer-to-peer (P2P) applications on limited devices. However,...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
This paper mainly compares with the implementation technology based on the WAP and J2ME solution. It especially emphasizes the differences among the application architect, the access ability of local saving space, the design of the interface, the technology of security, etc. And the author puts forward some suggestions. The author wishes that it could bring some illumination to the development and...
The JIMA toolkit is based on mobile argent architecture. Its application domain is software management over a network and the strategy of a mobile agent group, called agency is to insure that business rules are applied. If not, alert are raised to a manager. The number of manager depends on the size of the network to observe. JIMA is a portable toolkit written in Java Jini API. The framework is open...
A low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology is proposed in this paper. The proposed solution can be applied not only to various security systems, but also to environmental surveillance. Firstly, the basic principle of moving object detecting is given. Limited by the memory consuming and computing capacity of a mobile phone,...
In this paper, we propose a security protocol compiler that automatically generates security protocol modules based on a security protocol definition. Our security compiler loads a security protocol definition file that can be defined as a high-level specification of the protocol written in XML and it generates a C source code from the specification. Our security protocol compiler realizes fast C...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.