87 research outputs found

    One Time Secret Key Mechanism for Mobile Communication

    Full text link

    Location Management in a Mobile Object Runtime Environment

    Get PDF

    Mobile Data Management

    Get PDF
    The management of data in the mobile computing environment offers new challenging problems. Existing software needs to be upgraded to accommodate this environment. To do so, the critical parameters need to be understood and defined. We have surveyed some problems and existing solution

    GSM mobility management using an intelligent network platform

    Get PDF
    PhDAbstract not availabl

    A Survey of Quality of Service in Mobile Computing Environments

    Get PDF
    Accepted versio

    A Survey on Security for Mobile Devices

    Get PDF
    Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has signicantly increased due to the dierent form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research eld is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011. We focus on high-level attacks, such those to user applications, through SMS/MMS, denial-of-service, overcharging and privacy. We group existing approaches aimed at protecting mobile devices against these classes of attacks into dierent categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach

    Techniques of distributed caching and terminal tracking for mobile computing.

    Get PDF
    by Chiu-Fai Fong.Thesis (M.Phil.)--Chinese University of Hong Kong, 1997.Includes bibliographical references (leaves 76-81).Abstract --- p.iAcknowledgments --- p.iiiChapter 1 --- Introduction --- p.1Chapter 1.1 --- Distributed Data Caching --- p.2Chapter 1.2 --- Mobile Terminal Tracking --- p.5Chapter 1.3 --- Thesis Overview --- p.10Chapter 2 --- Personal Communication Network --- p.11Chapter 2.1 --- Network Architecture --- p.11Chapter 2.2 --- Resource Limitations --- p.13Chapter 2.3 --- Mobility --- p.14Chapter 3 --- Distributed Data Caching --- p.17Chapter 3.1 --- System Model --- p.18Chapter 3.1.1 --- The Wireless Network Environment --- p.18Chapter 3.1.2 --- Caching Protocol --- p.19Chapter 3.2 --- Caching at Mobile Computers --- p.22Chapter 3.3 --- Broadcasting at the Server --- p.24Chapter 3.3.1 --- Passive Strategy --- p.27Chapter 3.3.2 --- Active Strategy --- p.27Chapter 3.4 --- Performance Analysis --- p.29Chapter 3.4.1 --- Bandwidth Requirements --- p.29Chapter 3.4.2 --- Lower Bound on the Optimal Bandwidth Consumption --- p.30Chapter 3.4.3 --- The Read Response Time --- p.32Chapter 3.5 --- Experiments --- p.35Chapter 3.6 --- Mobility Concerns --- p.42Chapter 4 --- Mobile Terminal Tracking --- p.44Chapter 4.1 --- Movement Model --- p.45Chapter 4.2 --- Optimal Paging --- p.48Chapter 4.3 --- Transient Analysis --- p.52Chapter 4.3.1 --- The Time-Based Protocol --- p.55Chapter 4.3.2 --- Distance-Based Protocol --- p.59Chapter 4.4 --- The Reverse-Guessing Protocol --- p.64Chapter 4.5 --- Experiments --- p.66Chapter 5 --- Conclusions & Future Work --- p.71Chapter 5.1 --- Distributed Data Caching --- p.72Chapter 5.2 --- Mobile Terminal Tracking --- p.73Bibliography --- p.76A Proof of NP-hardness of the Broadcast Set Assignment Problem --- p.8
    • ā€¦
    corecore