Filters








22,178 Hits in 6.7 sec

"Intelligent" Technical Guidelines for Chongqing East Railway Station Building and Supporting Hub Area

Jingyuan Shi, Qiuna Li, Sang-Bing Tsai
2021 Mathematical Problems in Engineering  
the whole life cycle technical framework of "intelligent construction, intelligent service, intelligent management, and operation and maintenance."  ...  In this paper, by drawing on the advanced experience and norms at home and abroad, the compilation and research of "intelligent technical guidelines" for Chongqing east railway station and its supporting  ...  Acknowledgments is study was one of the scientific and technological research projects of Chongqing Municipal Education Commission: "Ecological Quality Improvement Technology of Chongqing Farm Houses under  ... 
doi:10.1155/2021/6680380 fatcat:qtwa5t4o2vektpndogq3mlvvli

User Acceptance of Pervasive Information Systems: Evaluating an RFID Ticketing System

Dimitrios C. Karaiskos, Panos E. Kourouthanassis, George M. Giaglis
2007 European Conference on Information Systems  
The results from a multiple regression analysis suggest that the salient beliefs of the technology acceptance model, namely perceived usefulness and ease of use are still strong predictors of user behaviour  ...  Pervasive Information Systems (Pervasive IS) constitute an emerging class of Information Systems in which Information Technology artefacts are embedded in the physical space, working together to sense  ...  (European Social Fund, 75%), by public expenditure from Greek public sector (Ministry of Development, General Secretariat for Research and Technology, 25%) and from private sector.  ... 
dblp:conf/ecis/KaraiskosKG07 fatcat:rb6ue7od7jfbpal24722mnampe

Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

Chun-I Fan, Vincent Huang
2016 Applied Sciences  
A mobile user may be cheated by some fake base stations in a mobile network system due to lack of mutual authentication.  ...  Furthermore, the system operator can charge the mobile user according to the communication time the user consumed via a credit-based way. Moreover, we also consider the issue of fair privacy.  ...  Tracing the tickets by a designated mobile user: If the police want to trace a criminal (whose real identity is ID MS ) in the time slot P i , the police can send (ID MS , γ i + 1 ) to H and ask H and  ... 
doi:10.3390/app6060176 fatcat:sgizskxu45gadnuvrx7msoumje

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

Noorrezam Yusop, Massila Kamalrudin, Mokhtar Mohd Yusof, Safiah Sidek
2016 Journal of Internet Computing and services  
There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information.  ...  The performance related to the correctness and time taken to elicit the security attributes were measured and recorded.  ...  [3] has presented an approach to support security requirements elicitation and analysis. They used a method to construct a system context using a problem-oriented notation.  ... 
doi:10.7472/jksii.2016.17.5.25 fatcat:zlqcyx52ejc5ln2uagcv65t6ze

Design of Self-Delegation for Mobile Terminals

Shinsaku Kiyomoto, Toshiaki Tanaka, Mariko Yoshida, Masahiro Kuroda
2005 IPSJ Digital Courier  
We propose two self-delegation schemes, and analyze the security of the proposed scheme based on a security model that we define.  ...  Furthermore, we have implemented the self-delegation and authentication protocols on a PDA and a Java card, both of which have ISO14443 I/F, and show the feasibility of the implemented protocols. 282 Vol  ...  Time (msec) Delegation of a secret key 109 Delegation of a ticket 1,353 Secret-key-based authentication 44 Ticket-based authentication 211  ... 
doi:10.2197/ipsjdc.1.282 fatcat:nqql72aiajgb7pgcq52y3uvsxy

An Architecture to Achieve Anonymity and Traceability

S Reshma
2012 IOSR Journal of Computer Engineering  
In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs.  ...  The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality  ...  In the fraud detection protocol, gateways report accumulated ticket records to the TA periodically instead of in real time.  ... 
doi:10.9790/0661-0143338 fatcat:tubh42ll3ngzxhucbldsrbp2uu

MobiPag: Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC

Helena Rodrigues, Rui José, André Coelho, Ana Melro, Marta Ferreira, João Cunha, Miguel Monteiro, Carlos Ribeiro
2014 Sensors  
Based on results from this trial, we identify a number of challenges and guidelines that may help to shape future versions of NFC-based payment systems.  ...  We identify a set of design lessons resulting from usage experiences associated with real-world payment situations with NFC-enabled mobile phones.  ...  Carlos Ribeiro and Miguel Pimenta Monteiro are the principal authors of the mobile payments protocol and the MobiPag middleware.  ... 
doi:10.3390/s140813389 pmid:25061838 pmcid:PMC4179034 fatcat:ikqsruxrknebncl46xlxvegkx4

Ticket based service access for the mobile user

Bhrat Patel, Jon Crowcroft
1997 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '97  
An allernative "homeless" mechanism based on the notion of tickets is proposed. The requirements and impacts of such a scheme are considered.  ...  Traditional mechanisms for service access, by mobile hosts across muhiple service domains, rely on the concept of a home location and cross domain authentication using roaming agreements.  ...  This consists of the ticket, a client generated random nonce, and a message authentication code constructed from a one way hash of the ticket, client nonce, server nonce, and the shared secret. 3.  ... 
doi:10.1145/262116.262150 dblp:conf/mobicom/PatelC97 fatcat:5v65aw2eh5gkreaz4un3if6tce

A location based security framework for authenticating mobile phones

Lishoy Francis, Keith Mayes, Gerhard Hancke, Konstantinos Markantonakis
2010 Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing - M-MPAC '10  
Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model  ...  We discuss the necessary security mechanisms and security protocols for such a framework and show that our framework is resilient to relay attacks.  ...  For instance, a mobile network operator may encounter network congestion from time to time due to a variety of reasons.  ... 
doi:10.1145/1890791.1890796 dblp:conf/middleware/FrancisMHM10 fatcat:wlnxixhbbzgfhbpvxlaksgu2qa

Using the Railway Mobile Terminals in the Process of Validation and Vending Tickets

Marko Horvat, Mario Zagar
2006 Journal of Cases on Information Technology  
The advantage of mobile terminals lies in the greater efficiency of railway tickets vending, the control and the real-time supervision of complete process of vending tickets in the country.  ...  Also information about each sold ticket is transmitted wirelessly via GSM/GRPS in real-time or near real-time.  ...  -Will the mobile terminals be able to safely and securely store a large amount of data? -Is the wireless bandwidth wide enough for real-time data transfer and how to achieve it?  ... 
doi:10.4018/jcit.2006040102 fatcat:3z2ft67stvaqpkgi4u4wqx6way

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang
2011 IEEE Transactions on Dependable and Secure Computing  
His research interests are network and distributed system security, wireless networking, and mobile computing, with emphasis on mobile ad hoc networks, wireless sensor networks, wireless mesh networks,  ...  In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs.  ...  Paterson for helpful discussions and suggestions.  ... 
doi:10.1109/tdsc.2009.50 fatcat:ptgkrvsyt5cp3bppq2ucqphedi

SAM: Secure Access of Media Independent Information Service with User Anonymity

Guangsong Li, Jianfeng Ma, Qi Jiang
2010 EURASIP Journal on Wireless Communications and Networking  
The protocol can be used to establish a secure channel between the mobile node and the information server.  ...  Security and performance of the protocol are also analyzed in this paper. namely, system discovery, handover decision, and handover execution [3].  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped them to improve this paper.  ... 
doi:10.1155/2010/249169 fatcat:lv3xmf6ufzhc7go74y2c2fww6i

Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan

Donald L. Amoroso, Rémy Magnier-Watanabe
2012 Journal of Theoretical and Applied Electronic Commerce Research  
phone every time their children go through a ticket gate and use their IC pass [77] .  ...  Japan is at the forefront of such technology and a number of domestic companies have been effectively developing and marketing mobile wallets for some time.  ...  In the former, a mobile phone keeps track of the time when the driver entered and exited, thus making paper tickets and parking attendants unnecessary.  ... 
doi:10.4067/s0718-18762012000100008 fatcat:qn24tuv4hza4pnup3vuxnqwq7y

Security on the move

Armando Fox, Steven D. Gribble
1996 Proceedings of the 2nd annual international conference on Mobile computing and networking - MobiCom '96  
We describe our implementation of the protocol and a sample secure rlogin application, and also describe how Charon can be used to implement cross-roaming agreements between mobile computing domains.  ...  Security and authentication on open networks is already a difficult problem, even without the additional risks posed by wireless media and the additional software constraints imposed by mobile computing  ...  Kerberos [9] is a time-tested, widely-deployed system that provides authentication and the establishment of secure channels in open networks.  ... 
doi:10.1145/236387.236439 dblp:conf/mobicom/FoxG96 fatcat:jbyawwx5xrfuhkjd4qmpiowuhm

Effectiveness of the E-Ticket System Using QR Codes For Smart Transportation Systems

Tommy Kuncara, Arman Syah Putra, Nurul Aisyah, VH. Valentino
2021 International Journal Of Science, Technology & Management  
This research will produce a system proposal that will make it easier for the public to use the ticket payment system, the use of QR codes will simplify transactions and speed up the payment process.  ...  it will be able to facilitate ordering and payment of tickets, therefore it will be able to increase ticket sales.  ...  The traditional paper-based ticket system used to track trucks loaded with construction materials has some major problems, such as theft, extension of travel time, risk of injury when collecting tickets  ... 
doi:10.46729/ijstm.v2i3.236 fatcat:6s5f5i6n5barvnhqpm3cooivba
« Previous Showing results 1 — 15 out of 22,178 results