The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile payment protocols have become more and more popular with the rapid development of network and mobile phones technologies. It gradually changes the consuming behaviors of consumers. However, must of the existing mobile payment protocols can only support on-line transactions. Some provides off-line transactions but have the limitation of micro-payments only. A micro-payment allows only a very...
In today's life, the mobile phone is an essential device for the modern human. The people play installed games in the mobile device to pass the time and express emotions. However, stand-alone off-line game may not require internet connection but pro-longed use predisposes bored. Therefore, multiplayer on-line game meets the needs of groups of human activity. In the almost multiplayer on-line games,...
Payment transaction using mobile phone has some possibilities of risk. Mobile devices still not secure and need more attention in the security area. In this paper, we propose mutual authentication technique between client and merchant using encrypted QR Code. QR Code has been widely used in recent technology. Secure transmission of data transaction can be accommodated using encrypted QR Code. QR Code...
The cloud computing environment enables cloud users to outsource their data into the cloud environment because of its cost efficiency and ease of management. However, by out sourcing the data to the cloud, cloud users lose their control over the data. This situation becomes more critical when using a cell phone and initiating the handoff process. There is a problem when cloud users invalidate some...
It is increasingly clear that existing phone security mechanisms are inadequate and that change is necessary. Instead of protecting phone conversations from eavesdropping, the UK government's proposed voice encryption standard appears to be designed to facilitate undetectable mass surveillance.
These are the networks which are formed by Mobile hand held devices like cell phones, laptops etc. Nodes in these networks are mobile in nature. Mobile adhoc networks are very useful in the situations such as military operations, disaster management etc. These networks do not require special additional fixed infrastructure but with the existing infrastructure all mobile nodes can cooperate and reach...
The biggest issue in dealing with the remote cooperative group is efficient and secured broadcast. There is unavailability of a fully trusted key generator center. The Secure key distribution implementation GKMP (Group Key Management Protocol) is an efficient solution to all these issues. It creates keys for groups, distributes to the key members, ensures rule based access and allows hierarchical...
Recently after a lot of research work and findings on wireless mobile communication and security, a PKI (Public Key Infrastructure) based AKA (Authentication and Key Agreement) scheme known as Optimizing PKI for 3GPP Authentication and Key Agreement(OPAKA) has been proposed in the field of 3G wireless mobile communication system. But on analysis it can be established that OP AKA has a serious security...
In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information...
The Information-Centric Networking (ICN) approach represents a prominent future Internet research activity. It aims to ensure a large-scale content distribution while supporting mobility and security natively. In this approach, named content represents the central element and it is independent from its delivering host. Security can no longer be tied to a particular location. It is built-in the content...
In this paper, we discuss the remaining security risk of Wi-Fi AP spoofing with current AP joining approaches and how a new solution has been developed as part of the ULOOP project in order to be more user-friendly and secure. It was an important step for increased security because our evaluation shows that even computer aware users do not know or do not bother about this issue although it is a real...
To reduce mobile users¡¦ dependence on effective network availability, this paper proposes mobile agent technology in mobile computing applications. This allows mobile users to perform data collection and electronic transactions in a wireless network environment. In an agent-based transaction protocol, mobile agents carry information provided by the user and are able to migrate between hosts to execute...
Mobile WiMAX is yet to meet the expectation from mobile users to provide secured and seamless services. Long delay in the time-consuming authentication procedure is a well-known bottleneck of the IEEE 802.16e handover scheme, causing service disruption when a mobile user moves between base stations. A pre-authentication-based handover scheme for mobile WiMAX networks aims to achieve fast and secure...
A mobile payment model of network ordering tickets is proposed, on the basis of which, this paper designed an efficient and safe protocol that can reaLize the function of network ordering tickets on the mobile terminal under the condition which satisfied the feature of mobile communication. Through the analysis the protocol satisfies non-repudiation, authentication and security. It is also simpler...
Financial payment via mobile phones, mobile payment, is one of the newest technologies in ICT domain which have been received many attentions by researchers in recent years. In this technology there is no need to use additional equipments such as pos devices. This system can be used in any application increasing human life level, including healthcare. However, mobile payment as a subset of electronic...
Vehicular Ad-Hoc Networks (VANETs) have the potential to optimize traffic in modern urban areas, reduce congestions and pollution, and increase passenger safety and comfort. Applications designed for such networks pose new security constraints. The mobile devices have limited resources to spare, and the network connectivity is reduced because of the mobility of cars. We present a security protocol...
This paper analyzes the efficiency problem of the protocol and then proposes a more efficient protocol that can reduce some hash operations and provide same security levels with an explicit key confirmation. The proposed protocol would be more suitable for mobile client-server environments.
Due to the characteristics of mobile ad hoc networks such as lack of infrastructure, shared wireless medium, resource constraints, and highly dynamic topology, a number of challenges to security design arise. In mobile ad hoc networks MANETs, traditional security solutions are not adequate due to the lack of infrastructure and the absence of centralized administration. Distributive key management...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
This paper studies mobile devices mediated electronic voting system based on the distributed Pailler's encryptions; We apply the standard cut-of-the-choose technique to avoid the computational zero-knowledge proofs and show that the proposed scheme is efficient yet somewhat provably secure in the simulation-based paradigm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.