325 research outputs found

    Future of Wireless Data Communication

    Get PDF
    This thesis develops four scenarios, illustrating the future of wireless data communication

    SMS based m-commerce: Meeting application and security requirements

    Get PDF
    This paper outlines the potential of SMS Based financial information and transaction services which can help users in account access, payments and in making time and location independent transactions.So far, existing m-commerce initiatives have focused on GPRS or SIM based approaches which have their specific limitations.After highlighting comparative strengths of SMS based m-commerce solutions vis a vis GPRS and SIM Based solutions the vulnerabilities of SMS technology are brought out in detail.Having outlined the security and application requirements for an m-commerce solution this paper details how Secure SMS based notification and transaction system meets these requirements

    The U.S. M-Business Market: Fad or the future

    Get PDF
    M-Business is information available on any device, anywhere and at anytime, offering businesses in any industry the potential to expand markets, improve their services and reduce costs. The U.S. m-business market is still in its infancy and is a few years away from becoming a growth market. This is due to a few reasons, which are the lack of standards for connectivity and service, no real applications to support the market and the lack of strong encryption to support m-business and e-commerce. M-business is not a fad but a potential new channel for business operations. This thesis will address the issues of why the U.S. m-business is slow to mature and what is required for the U.S. m-business to become a growth market

    Services on the Mobile Internet Service-Driven Technology Development

    Get PDF
    The purpose of this thesis is to describe and analyze the services on the mobile Internet and to identify when, where, and how these service offerings can be profitable. The thesis is a qualitative study based on in-depth interviews with key stakeholders in the service value chain and with relevant experts. Case methodology have been used to gather and structure the empirical material from three cases, i-mode in Japan, SMS in Europe, and BlackBerry in the USA to be able to generate new theory as well as expand on existing theory. The analysis, based on the three cases, generates and validates a model for successful service strategy on the mobile Internet. The service strategy is called service-driven technology development. Service-driven technology development explains the success of the three cases and provides a framework to successfully develop, implement, and maintain profitable services on the mobile Internet

    End-to-end security for mobile devices

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004Includes bibliographical references (leaves: 120)Text in English; Abstract: Turkish and Englishix, 133 leavesEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used in Internet, together with its predecessor, SSL protocol. By using TLS protocol in mobile world, the advantage of the proven security model of this protocol can be taken.J2ME (Java 2 Micro Edition) has been the de facto application platform used in mobile devices. This thesis aims to provide an end-to-end security protocol implementation based on TLS 1.0 specification and that can run on J2ME MIDP (Mobile Information Device Profile) environment. Because of the resource intensive public-key operations used in TLS, this protocol needs high resources and has low performance. Another motivation for the thesis is to adapt the protocol for mobile environment and to show that it is possible to use the protocol implementation in both client and server modes. An alternative serialization mechanism is used instead of the standard Java object serialization that is lacking in MIDP. In this architecture, XML is used to transmit object data.The mobile end-to-end security protocol has the main design issues of maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes the replacement of this library with another cryptography package easier.Mobile end-to-end security protocol is tested with a mobile hospital reservation system application. Test cases are prepared to measure the performance of the protocol implementation with different cipher suites and platforms. Measured values of all handshake operation and defined time spans are given in tables and compared with graphs

    WAP-BASED UTP EVENT MANAGEMENT SYSTEM

    Get PDF
    WAP-Based UTP Event Management System is actually an automated system for replacing the manual paper-based system in managing and facilitating the events and activities organized by UTP and also the societies such as Residential College Support Unit (RCSU), Majlis Perwakilan Pelajar Universiti Teknologi PETRONAS (MPPUTP), Persatuan Seni Silat Cekak, and many more. This report described the detailed analysis regarding the current situation and problems that are encountered by mostly the UTP student. The problem statement has been stated, the scope has been identified, and also the objectives have been listed out in order to be achieved in the final steps of this project. By having the WAP-based Event Management System, it is updated with the activities and events and the users will be more alert and aware with the existence of the events and activities held in UTP. This report will expose the users with the WAP technology that is widely used by the mobile phone users. This report also gives a better overview of WAP, the architecture of WAP, the advantages and also its applications which are currently applied and used by other people. The methodology that will be used must be applicable and suitable in order that there will be no mistakes or problems arise after the system has been implemented. Thus, the most suitable methodology that might help in the system development is Waterfall Model which is one of the System Development Life Cycle (SDLC). By developing this WAP-based Event Management System, the problems encountered by the UTP students and staff can be eliminated. They can obtain updated events information on their WAPenabled mobile phones. They can also access the information easily and quickly. i

    Personal information search on mobile devices

    Get PDF
    Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Management (PIM) on mobile devices. A search system which involves different types of mobile devices is also introduced.Turkish Army author
    corecore