The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents INSPEC2T's approach of designing and implementing a smart mobile application, part of a greater system (background services and supporting tools) emphasizing on its impact in day to day community policing operations and also in strategic decision making. Important aspects are: automation of processes, compliance to ethical and legal regulations, transparency in operations, user...
Internet of things (furthermore IoT) by definition refers to a networked interconnection of devices in everyday use that are often equipped with ubiquitous intelligence. It is based on processing of large quantities of data in order to provide useful information/service and enables an efficient regulatory policy in the area of IoT. One of the key challenges for the realization of the IoT includes...
The location security in current location-based services (LBS) meets threat where mobile users have to report their actual location knowledge to the LBS provider in order to get their desired POI, (Points of Interests). We consider location privacy techniques that work using obfuscation operators and provide different information services using different cloaking techniques without any trusted components...
With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some...
Vehicular Communication Networks is a subcategory of Mobile Communications Networks which have the special characteristics of high node mobility and fast topology changes. In this paper, we outline the basic characteristics and concepts of vehicular communications while specifically investigating one of the most challenging tasks in vehicular network deployment, which is security provision. We investigate...
The future networks have yet to be defined. These are not represented by the next generation of the Internet and they need to satisfy requirements for the sustainability of mankind. These are called Trusted Green Networks (TGNs) in this paper. Although TGNs offer marvelous concepts and excellent functions, they will not always be widely deployed. There have been several initiatives to develop future...
Illegal immigration and piracy are today two main threats to maritime security. An essential capability to address these threats is the awareness of the maritime domain. A number of technologies have been proposed to locate and identify vessels used by criminal activities in the open sea. This paper proposes the detection of criminal vessels in the open sea by monitoring emission of mobile satellite...
This paper reviews the definition of m-commerce (also called mobile commerce) and analyses its application models and benefits. Secondly, the paper discuss the value chain of m-commerce based on Value Reference Model (VRM), which consists of six core processes in two main areas: content, and infrastructure and services.
The ISICOM concept has been defined in the framework of the ISI technology platform as a mean to provide the necessary communication infrastructure in support to the achievement of the European Space Policy goals. In this paper, we introduce the ISICOM architecture: starting from the ISICOM devised missions, we describe the founding architecture concepts that shall be taken into consideration in the...
This paper identifies key research issues and technologies that we envision will be important to the continued evolution of satellite networking and its integration as a core component of a future Internet that offers reliable, robust and pervasive networking and access to network services.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.