A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
"Intelligent" Technical Guidelines for Chongqing East Railway Station Building and Supporting Hub Area
2021
Mathematical Problems in Engineering
the whole life cycle technical framework of "intelligent construction, intelligent service, intelligent management, and operation and maintenance." ...
In this paper, by drawing on the advanced experience and norms at home and abroad, the compilation and research of "intelligent technical guidelines" for Chongqing east railway station and its supporting ...
Acknowledgments is study was one of the scientific and technological research projects of Chongqing Municipal Education Commission: "Ecological Quality Improvement Technology of Chongqing Farm Houses under ...
doi:10.1155/2021/6680380
fatcat:qtwa5t4o2vektpndogq3mlvvli
User Acceptance of Pervasive Information Systems: Evaluating an RFID Ticketing System
2007
European Conference on Information Systems
The results from a multiple regression analysis suggest that the salient beliefs of the technology acceptance model, namely perceived usefulness and ease of use are still strong predictors of user behaviour ...
Pervasive Information Systems (Pervasive IS) constitute an emerging class of Information Systems in which Information Technology artefacts are embedded in the physical space, working together to sense ...
(European Social Fund, 75%), by public expenditure from Greek public sector (Ministry of Development, General Secretariat for Research and Technology, 25%) and from private sector. ...
dblp:conf/ecis/KaraiskosKG07
fatcat:rb6ue7od7jfbpal24722mnampe
Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy
2016
Applied Sciences
A mobile user may be cheated by some fake base stations in a mobile network system due to lack of mutual authentication. ...
Furthermore, the system operator can charge the mobile user according to the communication time the user consumed via a credit-based way. Moreover, we also consider the issue of fair privacy. ...
Tracing the tickets by a designated mobile user: If the police want to trace a criminal (whose real identity is ID MS ) in the time slot P i , the police can send (ID MS , γ i + 1 ) to H and ask H and ...
doi:10.3390/app6060176
fatcat:sgizskxu45gadnuvrx7msoumje
Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development
2016
Journal of Internet Computing and services
There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. ...
The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. ...
[3] has presented an approach to support security requirements elicitation and analysis. They used a method to construct a system context using a problem-oriented notation. ...
doi:10.7472/jksii.2016.17.5.25
fatcat:zlqcyx52ejc5ln2uagcv65t6ze
Design of Self-Delegation for Mobile Terminals
2005
IPSJ Digital Courier
We propose two self-delegation schemes, and analyze the security of the proposed scheme based on a security model that we define. ...
Furthermore, we have implemented the self-delegation and authentication protocols on a PDA and a Java card, both of which have ISO14443 I/F, and show the feasibility of the implemented protocols. 282 Vol ...
Time (msec)
Delegation of a secret key
109
Delegation of a ticket
1,353
Secret-key-based authentication
44
Ticket-based authentication
211 ...
doi:10.2197/ipsjdc.1.282
fatcat:nqql72aiajgb7pgcq52y3uvsxy
An Architecture to Achieve Anonymity and Traceability
2012
IOSR Journal of Computer Engineering
In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. ...
The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality ...
In the fraud detection protocol, gateways report accumulated ticket records to the TA periodically instead of in real time. ...
doi:10.9790/0661-0143338
fatcat:tubh42ll3ngzxhucbldsrbp2uu
MobiPag: Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC
2014
Sensors
Based on results from this trial, we identify a number of challenges and guidelines that may help to shape future versions of NFC-based payment systems. ...
We identify a set of design lessons resulting from usage experiences associated with real-world payment situations with NFC-enabled mobile phones. ...
Carlos Ribeiro and Miguel Pimenta Monteiro are the principal authors of the mobile payments protocol and the MobiPag middleware. ...
doi:10.3390/s140813389
pmid:25061838
pmcid:PMC4179034
fatcat:ikqsruxrknebncl46xlxvegkx4
Ticket based service access for the mobile user
1997
Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '97
An allernative "homeless" mechanism based on the notion of tickets is proposed. The requirements and impacts of such a scheme are considered. ...
Traditional mechanisms for service access, by mobile hosts across muhiple service domains, rely on the concept of a home location and cross domain authentication using roaming agreements. ...
This consists of the ticket, a client generated random nonce, and a message authentication code constructed from a one way hash of the ticket, client nonce, server nonce, and the shared secret. 3. ...
doi:10.1145/262116.262150
dblp:conf/mobicom/PatelC97
fatcat:5v65aw2eh5gkreaz4un3if6tce
A location based security framework for authenticating mobile phones
2010
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing - M-MPAC '10
Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model ...
We discuss the necessary security mechanisms and security protocols for such a framework and show that our framework is resilient to relay attacks. ...
For instance, a mobile network operator may encounter network congestion from time to time due to a variety of reasons. ...
doi:10.1145/1890791.1890796
dblp:conf/middleware/FrancisMHM10
fatcat:wlnxixhbbzgfhbpvxlaksgu2qa
Using the Railway Mobile Terminals in the Process of Validation and Vending Tickets
2006
Journal of Cases on Information Technology
The advantage of mobile terminals lies in the greater efficiency of railway tickets vending, the control and the real-time supervision of complete process of vending tickets in the country. ...
Also information about each sold ticket is transmitted wirelessly via GSM/GRPS in real-time or near real-time. ...
-Will the mobile terminals be able to safely and securely store a large amount of data? -Is the wireless bandwidth wide enough for real-time data transfer and how to achieve it? ...
doi:10.4018/jcit.2006040102
fatcat:3z2ft67stvaqpkgi4u4wqx6way
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
2011
IEEE Transactions on Dependable and Secure Computing
His research interests are network and distributed system security, wireless networking, and mobile computing, with emphasis on mobile ad hoc networks, wireless sensor networks, wireless mesh networks, ...
In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. ...
Paterson for helpful discussions and suggestions. ...
doi:10.1109/tdsc.2009.50
fatcat:ptgkrvsyt5cp3bppq2ucqphedi
SAM: Secure Access of Media Independent Information Service with User Anonymity
2010
EURASIP Journal on Wireless Communications and Networking
The protocol can be used to establish a secure channel between the mobile node and the information server. ...
Security and performance of the protocol are also analyzed in this paper. namely, system discovery, handover decision, and handover execution [3]. ...
Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped them to improve this paper. ...
doi:10.1155/2010/249169
fatcat:lv3xmf6ufzhc7go74y2c2fww6i
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan
2012
Journal of Theoretical and Applied Electronic Commerce Research
phone every time their children go through a ticket gate and use their IC pass [77] . ...
Japan is at the forefront of such technology and a number of domestic companies have been effectively developing and marketing mobile wallets for some time. ...
In the former, a mobile phone keeps track of the time when the driver entered and exited, thus making paper tickets and parking attendants unnecessary. ...
doi:10.4067/s0718-18762012000100008
fatcat:qn24tuv4hza4pnup3vuxnqwq7y
Security on the move
1996
Proceedings of the 2nd annual international conference on Mobile computing and networking - MobiCom '96
We describe our implementation of the protocol and a sample secure rlogin application, and also describe how Charon can be used to implement cross-roaming agreements between mobile computing domains. ...
Security and authentication on open networks is already a difficult problem, even without the additional risks posed by wireless media and the additional software constraints imposed by mobile computing ...
Kerberos [9] is a time-tested, widely-deployed system that provides authentication and the establishment of secure channels in open networks. ...
doi:10.1145/236387.236439
dblp:conf/mobicom/FoxG96
fatcat:jbyawwx5xrfuhkjd4qmpiowuhm
Effectiveness of the E-Ticket System Using QR Codes For Smart Transportation Systems
2021
International Journal Of Science, Technology & Management
This research will produce a system proposal that will make it easier for the public to use the ticket payment system, the use of QR codes will simplify transactions and speed up the payment process. ...
it will be able to facilitate ordering and payment of tickets, therefore it will be able to increase ticket sales. ...
The traditional paper-based ticket system used to track trucks loaded with construction materials has some major problems, such as theft, extension of travel time, risk of injury when collecting tickets ...
doi:10.46729/ijstm.v2i3.236
fatcat:6s5f5i6n5barvnhqpm3cooivba
« Previous
Showing results 1 — 15 out of 22,178 results