The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security policies beforehand, without knowing the exact capabilities and requirements of the platforms which will be present at run time. Especially when peers need to adhere to an appropriate trade-off between security and performance,...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to exchange their social data easily by using their phones and PDAs. We show that existing solutions put the users at security and privacy risks. Then, we describe our protocol for exchanging users' social data. We demonstrate that enables better security and privacy for exchanging social data. In addition...
Within a mobile environment, communications may necessitate different security properties depending on the sensitivity of the data exchanged. A protocol such as HTTPS that uses the Secure Socket Layer/Transport Layer Security (SSL/TLS) may offer these properties, but it is known that SSL/TLS is high-energy consuming and the properties are provided as a block, which may have an important impact on...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
In combination with the current technologies related with smartphones and e-mail, an e-mail system based on Ophone and component technology is designed to construct security safeguard during sending and receiving of e-mail client software according to MOSS protocol and realize easy and quick receipt of e-mails by use of pre-fetching strategy thus to achieve the design and implementation of efficient...
Initiated by volunteer computing efforts, the computation outsourcing problem can become a compelling application for networked set-top-boxes and mobile devices. In this paper we extend such environments with the ability to provide secure payments in exchange for outsourced CPU cycles. Previous contributions in wired networks have almost exclusively tackled only one side of the problem -- offering...
With the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable environment transaction management technology is believed to provide service reliability and data consistency. Existing models developed for mobile transactions mainly focus on variation of conventional commit procedures and give...
JXME is the JXTA protocols implementation for mobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default...
In this paper we propose a convenient way to access and invoke UPnP services available in a remote network. UPnP was originally developed for use in a local and private network, however as there is a growing number of affordable mobile devices which can easily connect to the internet from any place in the world it is just the next step to demand secure access to the services running at home. Another...
One of the important ways of e-commerce is using mobile devices because of time reduction and being location independent and most of all its personalized aspect. Because of these major traits IT professionals and merchants are encouraged using mobile devices more and more every day. Here in this article we are proposing a protocol for mobile payments that security and authentications are implemented...
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using location limited channels to transmit secure pairing information that can be verified as originating from the intended...
The number of software deployed on mobile terminals is dramatically increasing. However, this leads the mobile terminal facing a serious of security threats. In order to resolve these threat issues, several security requirements are proposed. Also, this paper introduces a secure software download framework and corresponding download protocol based on mobile trusted computing, designed to handle a...
This paper proposes a software obfuscation mechanism in conjunction with a tamper-proof module. The proposed mechanism overcomes the limitation of software-based obfuscation techniques where an obfuscated program contains critical parameters in itself. We divide a program into two parts: an obfuscated program and secret parameters. The obfuscated program is executed on a mobile phone or a computer,...
The family information technology has caught the attention of various industries such as IT, home appliances, communication, and real estate. Based on the home network theories, this paper describes a remote control system via Internet and GSM SMS, which controls smart home network in wired access mode and wireless communication mode, respectively. Although SMS is widely used for a variety of applications,...
This paper provides detailed solutions for trust delegation and secure temporary storage of medical records for authorized users in public mobile communication networks. The solutions presented in this paper enable the development of software that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements...
In 2004, the Near Field Communication (NFC) forum was formed to promote and supervise the use of the NFC technology. Nowadays, 150 members are taking part init and a growing number of stakeholders are fully involved in the development of this emerging technology. Consequently, many pilots have been launched worldwide in order to test and improve it. Issues related to the level of security that should...
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular,...
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In this paper, we provide an overview of security issues for smartphones and give a...
Mobile service raises a number of security and privacy challenges. To address this, we present an approach in which the mobile information security is enhanced by using external security key and specified policies. An electronic security key (eKey) is connected to the mobile device by adaptable interface for enhancing the security ability and storing private data. Front end administration module (FAM)...
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar devices. While this provides great convenience to the user, there are a number of security issues for which exploits are widely available. This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach. This paper investigates the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.