The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of mobile Internet, android system becomes the absolute overlord of the operating system, which has an unparalleled influence to the smart phone industry, but also closely related with people's lives. However, the feature of open source and lacking of regulatory of Android system led to a lot of security risks. Because of the widespread use of Android Intent Mechanism, the...
The project titled “ONLINE FLOWER MARKETING SYSTEM USING MOBILE APPS” is a comprehensive system which co-ordinates various operations in flower shop by using the mobile application through the online. This includes a variety of collections of flowers and flower made products such as flower arrangements, flower bouquets, retails and etc. This project deals with the booking of various flower products...
The dramatic spreading of mobile devices (smartphones and tablets) brings new information security risks and threats. These have to be taken seriously because they are weakening not just our personal security but the security of the organizations too. The security of organizations is mainly based on the attitude for security of the organizational members. Accordingly, the exploration of their approaches...
In the age of the Internet of Things, use of Smartwatch devices in the enterprise is evolving rapidly and many companies are exploring, adopting and researching the use of these devices in the Enterprise IT (Information Technology). The biggest challenge presented to an organization is understanding how to integrate these devices with the back end systems, building the data correlation and analytics...
Over the past two decades, mobile technology has evolved from simple mobile phones to smartphones with location-sensing and multiple forms of Internet connectivity. In the past few years, these have been joined by various Internet-connected, location-aware devices that make it possible to track the real-time location and behavior of millions of people. This paper summarizes major advantages and risks...
In this paper, we present DAGGER, a distributed architecture for collaborating mobile hosts and telecom operators for the granular mitigation of mobile-based attacks. Due to the growing usage of network resources by mobile handsets and the increasing spread of malicious applications among those handsets, it has become vital for mobile operators to join the fight against mobile-based attacks in order...
NFC, similar to RFID, is a contactless identification technology that has gained widespread adoption in application domains such as contactless transactions, micropayments, identity management and mobile health IDs etc. However, the NFC standard itself does not provide built-in security features. This means that each and every developer would need to implement security features in his NFC application...
Mobile payments are a natural evolution of e-payment schemes that will facilitate mobile commerce. A mobile payment or m-payment may be defined, as any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial value in return for goods and services. Mobile devices may include mobile phones, PDAs, wireless tablets and any other device that connect to mobile telecommunication...
Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the extremes. Basically, the dominant approach on current control access is via password or PIN, but its flaw is being clearly documented...
The undoubted success of very powerful and pervasively IP enabled cellular phones raises the obvious question whether the cellular world will also enter a severe security crisis like the PC itself. Moreover, this serious question is amplified through the use of new Open and even Web-OS oriented phone platforms. Considering the most dangerous security threat which might be given in the form of cellular...
Development of advanced mobile internet services requires flexible service platforms. Every service offering needs generic functionalities like security, billing and customer data management. Such functionalities used to be integrated in the mobile network infrastructure but are now offered by competing service platforms. Service platforms can still be offered by operators but can also be embedded...
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar devices. While this provides great convenience to the user, there are a number of security issues for which exploits are widely available. This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach. This paper investigates the...
Network operators can play an essential role in turning widely investigated context-aware services into a commercial reality. The Nokia Siemens Networks NEON project aims to develop a virtual network operator environment that can leverage the opportunities offered by packet-based multi-access networks, increasingly more powerful mobile devices, and service provider business practices to enhance the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.