The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants PDA. Today many people never leave home without their mobile phones. As content delivery over wireless devices becomes faster and scalable, there is wide speculation that m-commerce will surpass wireline e-commerce. M-commerce, in...
The NAC (network access control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various companies and has been widely deployed in intranets. Besides intranet, mobile telecommunication networks also find NAC is required. This paper introduces the main NAC solutions in industry...
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose a new secured architecture for two-party mobile payments, e.g. mobile banking. The proposed architecture employs a lightweight cryptography system that combines public key and symmetric key cryptography systems (ECDSA and AES),...
With the rapid development of mobile networks technology and popularization of mobile device, people can access Internet by mobile device and wireless connection covering the entire mobile communication network (GSM/GPRS/CDMA/3G/802.11etc) at any moment. Business system based on mobile network has been becoming hotspot. Compare with traditional business system, the security risk of business system...
Applications on network need not only enough quality of service (QoS) but also enough quality of security service (QoSS) because the security is essential for most of applications on network. The purpose of QoSS is to organize various security services together to achieve enough security for applications. As security requirements vary dramatically for different applications, differentiated security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.