The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
The number of mobile users have grown tremendously in the past few years. Nowadays, mobile phones are not just used for the purpose of making calls, rather they have become an important modern gadget which helps people in various aspects of their lives. With this increase, a lot of time on mobile is spent in browsing the internet websites through mobile web browsers. Hence, mobile web browsers actually...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
Recently, several protocols have been proposed to accomplish user authenticity with proper session key establishment in Global Mobility Network. Unfortunately, some of them still suffer from various security threats and high computational complexity. This article demonstrates a new enhanced two-factor authentication scheme for secure anonymous communication to mutually authenticate the communicating...
A major limitation of mobile Crowd Sourcing (CS) applications is the generation of false (or spam) contributions due to selfish and malicious behaviors of users, or wrong perception of an event. Such false contributions induce loss of revenue through disbursement of undue incentives and also negatively affects the application's operational reliability. In this work, we propose a reputation model,...
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
Mobile devices are becoming targets for hackers and malicious users due to the multifold increase in its capabilities and usage. Security threats are more prominent in mobile payment and mobile banking applications (MBAs). As these MBAs, store, transmit and access sensitive and confidential information, so utmost priority should be given to secure MBAs. In this paper, we have analyzed MBAs of several...
Security and privacy of mobile users is a theme of primary importance, given the widespread and growing use of connected smartphones, the great amount of personal data that can leak, and the lack of proper controlled environments in the current mobile scenario (for instance, mobile apps and their handling of permissions). In this paper we focus on a crucial part of this scenario: usage of mobile phone...
With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application...
An improved ant colony algorithm is proposed in the actual storage environment on the basis of safety and stability. Keeping the omni-directional mobile vehicle away from obstacles is concerned first in order to reduce the risk of collision in consideration of the car size and the diversity of the obstacle species. Then, redundant points are simplified in the path and fewer inflection path is filtered...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
Given the widely adoption of screen and camera in many electronic devices, the visible light communication (VLC) over screen-to-camera channel emerges as a novel short range communication technique in recent years. Active research explores various ways to convey messages over screen-camera channel, such as barcode and unobtrusive optical pattern. However, with the prevalence of LED screens of wide...
Mobile money is an upshot of the conventional banking system that creates an opportunity for the financially excluded group of people. It allows the unbanked in the rural areas and the underbanked in the urban centers to have access to financial services. User experience is all encompassing as it affects the emotion and the attitude of the user of a product or services. This study reviewed the related...
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
Summary form only given, as follows. A record of the panel discussion was not made available for publication as part of the conference proceedings. Hyperscale ethernet data centers (HEDCs) based on pure ethernet switching have come to dominate both the market and the conversation, and many think they are all that is necessary. But for many years specialized designs for HPC have survived, though these...
With the tremendous popularity of smartphones and other portable devices, crowdsensing applications have become a center of attention in recent years. Different mechanisms have been designed to incentivize mobile users to participate in crowdsensing. However, there are still many open issues needed to be investigated for these incentive mechanisms. In this paper, we systematically study the collusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.