The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A data stream generated from hysteresis-based multi-scroll chaos is proposed in this paper. The mathematical model of the multi-scroll chaotic attractor is a continuous-time linear third-order system with a feedback of hysteresis-series. The pseudo random data stream is generated from the state values of the third-order systems at the instance of hysteresis switching. Thanks to the complicated dynamical...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
This paper depicts the current situation of the development of the Internet of Things(IoT). RFID system is vulnerable to various attacks, because there is no physical or visible contact in its communication process. The research on security and privacy domain also increasingly causes the attention of academia. And this paper is mainly underlined that security and privacy issues exist ubiquitously,...
Recently, as smartphone is becoming more and more popular, concern about security threats against Mobile Communication Device (MCD) is getting higher. The MCD can not only become the target of the cyber attacks, but also be used as the tool of the cyber attacks. This paper proposes a context-based remote security control scheme for MCD. The proposed scheme consists of two systems: Context-based Mobile...
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
This paper presents an ubiquitous solution for providing a secure access for monitoring and controlling of a smart home by using a mobile device. It describes an end-to-end solution for an user friendly house and facility monitoring and control system. The solution enables the ubiquitous control of various house and facility automation devices by using a mobile smart phone and mobile internet access...
The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper we present a next-generation...
Residential Network is an inter-connection of several electrical and electronic home appliances for convenient, comfortable and daily life of home users. It is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home with various home network services regardless of device, time and place. More and more devices will be wireless and most of them...
In this paper, the issue of mobility and roaming in Pay-TV systems are studied to propose the novel multidomain universal service delivery architecture to provide legitimate subscribers with a ubiquitous access to multimedia services. The paper also considers other cooperating IP/Mobile and Broadcast architectures to add flexibility and mobility in service provisioning to a certain geographical area...
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
The goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet, with the desired quality of service. In such an environment, it becomes very difficult for service providers to satisfy the needs of users. A solution is to assign a profile to each user in order to optimize and automate the dynamic service level negotiation. These mobile...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
As pervasive systems become more prevalent, the need to protect these systems increases. In staying with the ideals of pervasive computing, we want to provide protection for these systems while remaining as unobtrusive to the user. It is seldom possible to guarantee the trustworthiness of users and resources. As a result, we devise systems designed to elicit the trustworthiness of users and resources...
The pervasive service interaction (PERCI) application allows interaction with Web services through associated real world objects equipped with contact less tags. The tags are read with a mobile. The read tag content is used to invoke Web service in the back-end system. The case study presented here is identifying in a structured approach security and privacy requirements of an near field communication...
Pervasive computing is providing its usability and scope in almost every aspect nowadays. In order to make better use of pervasive services in nomadic devices, pervasive client download might be needed, which would result in serious security problems due to executing untrusted applications. Recently Security-by-Contract has been proposed to address this problem, where an application is required to...
This work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a reflection on different mobile middlewares is made: their capacities to face the challenges of mobility and security issues. The analyses show that the existing middlewares have very few approaches on security problems; security is still a complex issue to be managed in all...
This paper takes the physical notion of personal space as the basis for a vision of an analogous logical notion of a personal eSpace. Convergence between mobile and Internet technologies and the future enhancement of both will result in a world which is so complex, so open to abuse and so alien to our common sense reasoning that automated protection mechanisms based on understandable metaphors will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.