The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Latest innovations demand the employment of web based services and applications in Internet rather than developing the applications. This paradigm shift could be attributed with the high scalability of Web Applications. The Cloud Phone is HTML5 based mobile device. In this device all the user functionalities, applications and entire tope level UI/UX will be downloaded and cached from a cloud server...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
Bluetooth, as the most popular end user choice of wireless connection, have its own security issues till now. In this paper, we introduce the proof-of-concept of BTFriend, the only Bluetooth Security Alert System designed for end users. We also discuss the development of first version BTFriend's prototype including the creation of Bluetooth device threat classification database and the usage of vNote...
With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations...
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Strong authentication solutions using two identification factors require often an additional device, which could be inconvenient for the user and costly for the service providers. To avoid the usage of additional...
Automation is the process of having a machine or machines to accomplish tasks hitherto performed wholly or partly by humans. Home automation concerns automating the domestic tasks. There are number of applications addressing home automation and monitoring involving infrared/Bluetooth or Ethernet over Power techniques in remote controls. But there is no such publication on providing facility to control...
Radio-frequency identification (RFID) technology is widespread developed and common for vehicle management in intelligent community. However, smart card used as the sole certificate of identification could also be impersonated by criminals when the card is lost or stolen. In this paper, an improvement design to the current widely-used vehicle monitoring systems, which utilize the RFID technology to...
Usability and user interfaces play a huge and important role in todaypsilas mobile application. Besides a good design, acceptable performance, scalability, and robustness, a mobile application needs to be easy to use and, to some extent, customizable. To create a system able to custom the mobile applicationpsilas user interface and mirror it immediately to final users is the purpose of this article...
Traffic security is one of the most important problems to be improved for our daily environment, especially in Japan. Surveillance systems are effectively used to observe intrusion into dangerous and security area. They are well evaluated to monitor whether people enter such an area or not. A remote surveillance system has been developed, which supports users of mobile phones to facilitate network...
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for one time password generation. The generated one time password is valid for only a short user-defined...
Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital...
There have been 220 million mobile phone users and numerous PDA in our country at the moment, these mobile terminals form the huge potential market of mobile e-commerce which will be the development trend of future e-commerce. Compared with traditional mediums of payment, using mobile terminals, such as mobile phone and PDA, etc to carry out transactions and payments will be more flexible and convenient...
In this paper we investigate the problem of the growing amount of personal content available online and the privacy problems associated with this area. Different levels of security requirements and possible solutions are shown. Finally, we propose a smartcard based right management solution, which is using the SIM of a mobile phone as trusted entity.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.