4,787 research outputs found
IMPLEMENTATION OF WIRELESS LAN IN UTP
This paper, entitled Implementation ofWireless LAN in UTP environment, looks into
the way to implement wireless network in UTP. The main objectives ofthis project are
to provide mobile network and internet access using university's network system to
students and lecturers and to make it easier and convenient for student to download
lecture notes and for lecturers to upload them. Currently, there is no wireless LAN
access in UTP environment that can be use by students and staff as alternative
opportunity to access and share instant information. Therefore, this project research
area is to find out the way to implement wireless LAN using secure Wi-Fi in UTP
external environment. For this study, the scope is narrow down to the architecture and
design ofwireless LAN network and its developing methodology. Anetwork simulation
tool called Network Simulator version 2, or simply known as ns-2, is used to test the
efficiency and functionality ofthe designed network. The outcome ofthis project is a
good network architecture design that will give high network performance to all users in
UTP
Design of secure mobile payment protocols for restricted connectivity scenarios
The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version
Wireless standard-compliant e-health solution for elderly people with multiuser identification
One of the main problems in e-health environments for developing an accurate multiuser identification is in the large number of patients, especially with itinerant medical devices and elderly people. This paper aims to contribute with two approaches to be included in ISO/IEEE 11073 family of standards as a standardized procedure for multiuser identification that can be used for a large variety of medical devices, regardless of their brand or model. From this contribution and to validate it, this work proposes a standardized e-health solution, including multiuser identification, implementing it in real health environments for elderly people, and evaluating their usability, interoperability, and adoption in daily living
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
- …