The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with the rapid development of 3rd generation mobile communication technologies, the applications of M-Commerce have been greatly expanded. Based on the research and analysis of the J2ME platform, this paper proposes a secure architecture for M-Commerce systems under the 3G networks. The proposed solution is the combination of J2EE and J2ME capabilities based on the three-tier architecture, as...
To realize remote data collection and transmission by using SMS, the operating principle and characteristics of SMS are researched for higher reliability and security in this article. Enhanced design is implemented for its safety and reliability based on the SMS protocol. A new remote data transmission technology is proposed, which is based on SMS with low cost, high safety and high reliability, and...
Voice over Internet protocol is the ability of transmitting voice using the Internet protocol. This paper addresses an introduction to VoIP, threats of VoIP and studies previous works of secure VoIP. We also propose practical implementations for securing VoIP by using Java and Android. Finally we give security analysis of our implementation and analyze different protocols involved in making VoIP more...
With the rapid development of network, some novel applications like remote database access, electric commerce, etc. bring forth many new requirements for network loads, network communication efficiency and network security. This paper adopts mobile agent technology to achieve remote access to databases. Compared to the traditional C/S computing model, this method can significantly improve the communication...
Trust and reputation models research and development for distributed systems such as P2P networks, wireless sensor networks (WSNs) or multi-agent systems has arisen and taken importance in the last recent years among the international research community. However it is not always easy to check the correctness and accuracy of a model and even more, to compare it against other trust and reputation models...
One of the most important issues in traditional and modern networks architecture is security. Data integrity and authenticity are the most critical points that a network security model should protect and ensure. Authentication, Authorization and Accounting model (AAA Protocol) is one of the most portable security concepts. Authentication acts providing proof of authenticity for stored data and verifying...
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a verification framework for sensor network applications. Key features include automation of: extraction of models, generation and composition of intrusion models, and verification of security properties.
Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital...
Centralized management and monitoring of network elements (NEs) in a communication network is very critical to ensure high availability and lower downtime. Many management protocols like SNMP, CMIP, TL1, CORBA etc. have been standardized by different bodies to facilitate unified management of different types of NEs. However, many NEs do not support these standard management protocols for different...
Incorporating security to large Java applications is a tricky and sometimes difficult task, which may increase code complexity, development costs and unmaintainability. For these reasons, some frameworks are emerging which facilitate the inclusion of security processes (i.e. authentication and authorization) in a declarative way through aspect weaving. In this context, ACEGI is the reference framework...
Today more then ever, secure communication is a must. Most companies now user network infrastructure to conduct their business, whether internally (intranet model) or externally to reach partners or customers (extranet/Internet models). While it is utopian to consider today's networks as being safe, there are solutions to make them more secure and use them with a bit of trust. The key aspects to securing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.