325 research outputs found
Future of Wireless Data Communication
This thesis develops four scenarios, illustrating the future of wireless data communication
SMS based m-commerce: Meeting application and security requirements
This paper outlines the potential of SMS Based financial information and transaction services which can help users in account access, payments and in making time and location independent transactions.So far, existing m-commerce initiatives have focused on GPRS or SIM based approaches which have their specific limitations.After highlighting comparative strengths of SMS based m-commerce solutions vis a vis GPRS and SIM Based solutions the vulnerabilities of SMS technology are brought out in detail.Having outlined the security and application requirements for an m-commerce solution this paper details how Secure SMS based notification and transaction system meets these requirements
The U.S. M-Business Market: Fad or the future
M-Business is information available on any device, anywhere and at anytime, offering businesses in any industry the potential to expand markets, improve their services and reduce costs. The U.S. m-business market is still in its infancy and is a few years away from becoming a growth market. This is due to a few reasons, which are the lack of standards for connectivity and service, no real applications to support the market and the lack of strong encryption to support m-business and e-commerce. M-business is not a fad but a potential new channel for business operations. This thesis will address the issues of why the U.S. m-business is slow to mature and what is required for the U.S. m-business to become a growth market
Services on the Mobile Internet Service-Driven Technology Development
The purpose of this thesis is to describe and analyze the services on the mobile Internet and to identify when, where, and how these service offerings can be profitable. The thesis is a qualitative study based on in-depth interviews with key stakeholders in the service value chain and with relevant experts. Case methodology have been used to gather and structure the empirical material from three cases, i-mode in Japan, SMS in Europe, and BlackBerry in the USA to be able to generate new theory as well as expand on existing theory. The analysis, based on the three cases, generates and validates a model for successful service strategy on the mobile Internet. The service strategy is called service-driven technology development. Service-driven technology development explains the success of the three cases and provides a framework to successfully develop, implement, and maintain profitable services on the mobile Internet
End-to-end security for mobile devices
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004Includes bibliographical references (leaves: 120)Text in English; Abstract: Turkish and Englishix, 133 leavesEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used in Internet, together with its predecessor, SSL protocol. By using TLS protocol in mobile world, the advantage of the proven security model of this protocol can be taken.J2ME (Java 2 Micro Edition) has been the de facto application platform used in mobile devices. This thesis aims to provide an end-to-end security protocol implementation based on TLS 1.0 specification and that can run on J2ME MIDP (Mobile Information Device Profile) environment. Because of the resource intensive public-key operations used in TLS, this protocol needs high resources and has low performance. Another motivation for the thesis is to adapt the protocol for mobile environment and to show that it is possible to use the protocol implementation in both client and server modes. An alternative serialization mechanism is used instead of the standard Java object serialization that is lacking in MIDP. In this architecture, XML is used to transmit object data.The mobile end-to-end security protocol has the main design issues of maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes the replacement of this library with another cryptography package easier.Mobile end-to-end security protocol is tested with a mobile hospital reservation system application. Test cases are prepared to measure the performance of the protocol implementation with different cipher suites and platforms. Measured values of all handshake operation and defined time spans are given in tables and compared with graphs
Recommended from our members
Mobile Commerce: Assessing New Business Opportunities
Mobile commerce has become the latest topic for today. Business organizations have been restlessly evaluating the revenue potential of the m-commerce market and developing business models to exploit the huge profit potential of this new market. In this project we try to provide an overview of the fundamentals about m-commerce. This paper attempts to help business managers, particularly those without IT background, to understand the key elements and basic concepts of m-commerce and to assess the impact of m-commerce on current and future businesses as well as to identify new business opportunities
WAP-BASED UTP EVENT MANAGEMENT SYSTEM
WAP-Based UTP Event Management System is actually an automated system for
replacing the manual paper-based system in managing and facilitating the events and
activities organized by UTP and also the societies such as Residential College Support
Unit (RCSU), Majlis Perwakilan Pelajar Universiti Teknologi PETRONAS (MPPUTP),
Persatuan Seni Silat Cekak, and many more.
This report described the detailed analysis regarding the current situation and
problems that are encountered by mostly the UTP student. The problem statement has
been stated, the scope has been identified, and also the objectives have been listed out in
order to be achieved in the final steps of this project. By having the WAP-based Event
Management System, it is updated with the activities and events and the users will be
more alert and aware with the existence of the events and activities held in UTP. This
report will expose the users with the WAP technology that is widely used by the mobile
phone users. This report also gives a better overview of WAP, the architecture of WAP,
the advantages and also its applications which are currently applied and used by other
people.
The methodology that will be used must be applicable and suitable in order that
there will be no mistakes or problems arise after the system has been implemented. Thus,
the most suitable methodology that might help in the system development is Waterfall
Model which is one of the System Development Life Cycle (SDLC). By developing this
WAP-based Event Management System, the problems encountered by the UTP students
and staff can be eliminated. They can obtain updated events information on their WAPenabled
mobile phones. They can also access the information easily and quickly.
i
Personal information search on mobile devices
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Management (PIM) on mobile devices. A search system which involves different types of mobile devices is also introduced.Turkish Army author
- …