4,787 research outputs found

    IMPLEMENTATION OF WIRELESS LAN IN UTP

    Get PDF
    This paper, entitled Implementation ofWireless LAN in UTP environment, looks into the way to implement wireless network in UTP. The main objectives ofthis project are to provide mobile network and internet access using university's network system to students and lecturers and to make it easier and convenient for student to download lecture notes and for lecturers to upload them. Currently, there is no wireless LAN access in UTP environment that can be use by students and staff as alternative opportunity to access and share instant information. Therefore, this project research area is to find out the way to implement wireless LAN using secure Wi-Fi in UTP external environment. For this study, the scope is narrow down to the architecture and design ofwireless LAN network and its developing methodology. Anetwork simulation tool called Network Simulator version 2, or simply known as ns-2, is used to test the efficiency and functionality ofthe designed network. The outcome ofthis project is a good network architecture design that will give high network performance to all users in UTP

    Design of secure mobile payment protocols for restricted connectivity scenarios

    Get PDF
    The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version

    Wireless standard-compliant e-health solution for elderly people with multiuser identification

    Get PDF
    One of the main problems in e-health environments for developing an accurate multiuser identification is in the large number of patients, especially with itinerant medical devices and elderly people. This paper aims to contribute with two approaches to be included in ISO/IEEE 11073 family of standards as a standardized procedure for multiuser identification that can be used for a large variety of medical devices, regardless of their brand or model. From this contribution and to validate it, this work proposes a standardized e-health solution, including multiuser identification, implementing it in real health environments for elderly people, and evaluating their usability, interoperability, and adoption in daily living

    Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks

    Full text link

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users
    • …
    corecore