The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to exchange their social data easily by using their phones and PDAs. We show that existing solutions put the users at security and privacy risks. Then, we describe our protocol for exchanging users' social data. We demonstrate that enables better security and privacy for exchanging social data. In addition...
The security flaws of a direct anonymous attestation scheme proposed by He et al. was analyzed, and the result shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerading attacks when being used for remote attestation. An improved direct anonymous attestation authentication scheme with the involvement of key agreement was proposed to provide the property...
Within a mobile environment, communications may necessitate different security properties depending on the sensitivity of the data exchanged. A protocol such as HTTPS that uses the Secure Socket Layer/Transport Layer Security (SSL/TLS) may offer these properties, but it is known that SSL/TLS is high-energy consuming and the properties are provided as a block, which may have an important impact on...
Intrusion detection (ID) effectiveness (low latency, low overhead, high accuracy) depends also on the collection of the corresponding data. In this paper we introduce an active maintenance mechanism that is distributed utilizing one hop information. This mechanism focuses on the maintenance of optimally formed tree ID structures, utilized for the collection and processing of ID data. The maintenance...
In Unattended Wireless Sensor Networks, data are stored locally and wait for a sink to offload. Since there is no real time communication between the sensors and the sink, a powerful mobile adversary can corrupt the collected data between the sink visits. In this paper, we propose simple and effective algorithms to limit data corruption in homogeneous unattended wireless sensor networks, without implementing...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource sharing between mobile clients/users that are socially interconnected. However, the functionality and security of such networks would be potentially undermined without an effective trust management...
In combination with the current technologies related with smartphones and e-mail, an e-mail system based on Ophone and component technology is designed to construct security safeguard during sending and receiving of e-mail client software according to MOSS protocol and realize easy and quick receipt of e-mails by use of pre-fetching strategy thus to achieve the design and implementation of efficient...
The mobile agent is a computer program that can move between different hosts in heterogeneous networks. This paradigm is advantageous for distributed systems implementation, especially in mobile computing application characterized by low bandwidth, high latency and unreliable networks connections. Mobile agent is also attractive for distributed transactions applications. Although mobile agent has...
With the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable environment transaction management technology is believed to provide service reliability and data consistency. Existing models developed for mobile transactions mainly focus on variation of conventional commit procedures and give...
JXME is the JXTA protocols implementation for mobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default...
The following topics are dealt with: mobility; quality of service; measure based and classification mechanism; clusters, grids, and distributed systems; processors and input/output systems; data security; multimedia communications; protocols; wireless networks; computer applications; real time systems; and voice over IP.
One of the important ways of e-commerce is using mobile devices because of time reduction and being location independent and most of all its personalized aspect. Because of these major traits IT professionals and merchants are encouraged using mobile devices more and more every day. Here in this article we are proposing a protocol for mobile payments that security and authentications are implemented...
In recent years mobile transactions have attracted a large number of clients. Being a more convenient and secured approach to perform remote governmental transactions than Internet, mobile transaction has turned into a more appealing method than previous methods. However, implementing wireless communication technologies may result in more complicated information security issues. This paper discusses...
The following topics are dealt with: UBICOMM; ubiquitous multimedia systems; ubiquitous mobile services; protocols; software security; wireless technology; collaborative ubiquitous systems; and WIP.
With the advances in the processing capabilities of wireless devices such as smart phones and laptops, the demand for staying connected to the Internet has steadily increased. This demand is strengthened further by the introduction of Internet connectivity within the airplanes. Mobile IP is one of the protocols that have been proposed to support user/network mobility. Mobile IP introduces new entities...
The number of software deployed on mobile terminals is dramatically increasing. However, this leads the mobile terminal facing a serious of security threats. In order to resolve these threat issues, several security requirements are proposed. Also, this paper introduces a secure software download framework and corresponding download protocol based on mobile trusted computing, designed to handle a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.