Filters








106 Hits in 3.4 sec

Model-Based Testing of a WAP Gateway: An Industrial Case-Study [chapter]

Anders Hessel, Paul Pettersson
2007 Lecture Notes in Computer Science  
We focus on testing the software implementing the session (WSP) and transaction (WTP) layers of the WAP protocol.  ...  We present experiences from a case study where a model-based approach to black-box testing is applied to verify that a Wireless Application Protocol (WAP) gateway conforms to its specification 1 .  ...  Acknowledgment We thank the other members of the ASTEC AuToWay project at Ericsson and Uppsala University: Tomas Aurell, Anders Axelssson, Johan Blom, Joel Dutt, Bengt Jonsson, Natalie Jost, John Orre,  ... 
doi:10.1007/978-3-540-70952-7_8 fatcat:oeau6oyctncidftavnebjtv274

A methodology for analyzing the performance of authentication protocols

Alan Harbitter, Daniel A. Menascé
2002 ACM Transactions on Privacy and Security  
Performance, in terms of user response time and the consumption of processing and communications resources, is an important factor to be considered when designing authentication protocols.  ...  The mix of public key and secret key encryption algorithms typically included in these protocols makes it difficult to model performance using conventional analytical methods.  ...  ACKNOWLEDGMENTS The authors would like to extend special thanks to the reviewers for comments that greatly improved the quality of the final article.  ... 
doi:10.1145/581271.581275 fatcat:mrisahblurbfpattavkuo4wfne

Issues in Mobile E-Commerce

Peter Tarasewich, Robert C. Nickerson, Merrill Warkentin
2002 Communications of the Association for Information Systems  
One significant area of technological advancement is the development of mobile e-commerce, which encompasses interactive business activities and processes related to a (potential) commercial transaction  ...  This emerging mobile e-commerce environment presents a new set of issues.  ...  ACKNOWLEDGEMENTS The authors thank Henri Isaac of the University of Paris Dauphine for his feedback on a draft of this paper. Editor's Note: This paper was fully peer reviewed.  ... 
doi:10.17705/1cais.00803 fatcat:ghlyclm4lrg5rj5zmlcgxx53jq

An Integrated Architecture for Enhanced Structuring of Mobile Market Place

Amer Ali Sallam, Siba K. Udgata
2011 International Journal of Artificial Intelligence & Applications  
This architecture deals with different components of mobile marketplace and it considering a new way of integrating different functionalities of mobile market place. .  ...  This paper aims at presenting an integrated architecture for mobile marketplace for efficient transaction and marketing using mobile devices and related infrastructure.  ...  A wellknown example of this topology is called a WAP-enabled device with a cellular network and a gateway that includes the WAP gateway software.  ... 
doi:10.5121/ijaia.2011.2102 fatcat:kjsclbh2ufgxfm6jetjnxwoqzy

A Robust Security Mechanism for Mobile Commerce Transactions

Eun-Jun YOON, Kee-Young YOO
2010 IEICE transactions on information and systems  
However, in 2008, Yum et al. pointed out that Yeh-Tsai security mechanism is not secure against malicious WAP gateways and then proposed a simple countermeasure against the attack is to use a cryptographic  ...  In addition, we propose a new security mechanism to overcome the weaknesses of the previous related security mechanisms.  ...  In order to support the desired security feature perfect forward secrecy, and to resist various attacks, WAP offers the service of secure wireless data exchange of information thanks to a security protocol  ... 
doi:10.1587/transinf.e93.d.2898 fatcat:kpgagbwusjhdrozwk42zoipxvq

A three-tier view-based methodology for M-services adaptation

D.K.W. Chiu, S.C. Cheung, E. Kafeza, Ho-Fung Leung
2003 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
In addition, we introduce a novel approach of applying process views to m-service adaptation, where mobile users may execute a more concise version or modified procedures of the original process.  ...  We demonstrate the feasibility of our methodology by extending a service negotiation subsystem into an m-service with multi-platform support.  ...  This can be handled through simple form-filling on an interactive wireless application protocol (WAP) interface on a mobile phone. 3) Constraint mode: The requestor specifies constraints representing his  ... 
doi:10.1109/tsmca.2003.819489 fatcat:24zuqvzy6nenblsxjptw7dnwvi

XTR Cryptosystem for SMS Security

Ashok Kumar Nanda, Lalit Kumar Awasthi
2012 International Journal of Engineering and Technology  
The transmission of an SMS in GSM network is not secure at all. Therefore, it is desirable to secure SMS for business purposes by additional encryption.  ...  SMS's security has become a major concern for business organizations and customers. There is a need for an end to end SMS Encryption in order to provide a secure medium for communication.  ...  ACKNOWLEDGEMENTS This research work is supported by ministry of human resource development (MHRD), Government of India.  ... 
doi:10.7763/ijet.2012.v4.495 fatcat:n3mncz47knf47eojhovkdgh2fy

An open financial services architecture based on the use of intelligent mobile devices

Apostolos Kousaridas, George Parissis, Theodore Apostolopoulos
2008 Electronic Commerce Research and Applications  
A unified scenario is designed and a prototype is implemented to demonstrate the feasibility of the proposed architecture.  ...  The scope of this paper is to explore, analyze and develop a universal architecture that supports mobile payments and mobile banking, taking into consideration the third and the emerging fourth generation  ...  Kauffman, Stamatis Karnouskos, Elaine Lawrence and Key Pousttchi as well as the anonymous reviewers for their constructive suggestions and comments during the whole revision process.  ... 
doi:10.1016/j.elerap.2007.04.003 fatcat:shp4jhxibfehply4drpm5pzg64

Security in embedded systems

Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady
2004 ACM Transactions on Embedded Computing Systems  
However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system.  ...  Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns-on the  ...  Various security protocols and standards such as WEP [IEEE Standard 802.11 ], WTLS [WAP 2002] , IPSec [IPSec] , and SSL [SSL] are used today to secure a range of data services and applications.  ... 
doi:10.1145/1015047.1015049 fatcat:2x62l5pmdnawhnisbbfdvvgkly

The Impacts of M-Commerce on Saudi Banks

Wafi AlBalawi, Imdadullah Hidayat-ur-Rehman
2016 Journal of Management and Strategy  
It is obvious that the next evolution stage for Banks with the business organizations is to provide a platform to users where they can easily operate their accounts without being connected to any wired  ...  The main purpose of this research is to critically analyze the impact of mobile commerce on the banks of Saudi Arabia.  ...  An empirical evaluation of the revised http://jms.sciedupress.com  ... 
doi:10.5430/jms.v7n2p1 fatcat:hoxu7a2h55fsbkpnpg3c5xxwo4

An Exploratory Study of Killer Applications and Critical Success Factors in M-Commerce

Gordon Xu, Jairo A. Gutierrez
2006 Journal of Electronic Commerce in Organizations  
After compiling significant information from the related literature, a Delphi panel was assembled by selecting a group of experts who has significant knowledge about m-commerce and wireless communications  ...  The panel was requested to comment on a number of m-commerce issues and scenarios gleaned from the literature review, and members of the panel also were asked to indicate which issues were more important  ...  (1985) , and a Ph.D. in Information Systems from The University of Auckland (1997).  ... 
doi:10.4018/jeco.2006070104 fatcat:vq7yrdqqonfj3c3sc5svbjz37i

Extending Enterprise Architecture with Mobility

Ming-Chien Wu, Bhuvan Unhelkar
2008 VTC Spring 2008 - IEEE Vehicular Technology Conference  
Preface This thesis reflects my research study and its results in the area of extending Enterprise Architecture with Emerging Mobile Technologies presenting a comprehensive structure that aims to extend  ...  Vijay Khandelwal, one of my lecturer, who teaches in business process reengineering area. He suggested me going forward to do a doctoral research in this area, and also introduced me to Dr.  ...  WAP security is provided through the Wireless Transport Layer Security (WTLS) protocol (in WAP 1.0) and IETF standard Transport Layer Security (TLS) protocol (in WAP 2.0).  ... 
doi:10.1109/vetecs.2008.617 dblp:conf/vtc/WuU08 fatcat:udab4nu64ve2pjpzy3agzjhyca

Integrated Mobile GIS and Wireless Internet Map Servers for Environmental Monitoring and Management

Ming-Hsiang Tsou
2004 Cartography and Geographic Information Science  
This paper provides an overview of a NASA-funded research project that focuses on the development of mobile GIS tools and wireless Internet Map Server (IMS) services to facilitate environmental monitoring  ...  With the progress of mobile GIS technology there is a great potential for adopting wireless communications and Internet mapping services for regional environmental management programs and natural habitat  ...  ACKNOWLEDGEMENTS This paper forms a portion of the "Integrated Mobile GIS and Wireless Image Web Services for Environmental Monitoring and Management" project supported by NASA's Affiliated Research Center  ... 
doi:10.1559/1523040042246052 fatcat:2skc3j7qbfdrzhtnugjcq66ap4

Industry architecture as a determinant of successful platform strategies: a case study of the i-mode mobile Internet service

Richard Tee, Annabelle Gawer
2009 European Management Review  
This paper explores this issue through a case study comparing the deployment of the imode mobile Internet service in two countries, seeking the reasons behind its contrasting fortunes: spectacular success  ...  In Europe, most network operators focused on delivering mobile Internet services via standard protocols, in particular WAP (Wireless Application Protocol) and MMS (Multimedia Messaging Service) ( (Sigurdsson  ...  The approach differed fundamentally from solutions such as i-mode, in that WAP was set up by handset makers to act essentially as a standardized protocol for data delivery.  ... 
doi:10.1057/emr.2009.22 fatcat:5tx7el7vrndc5hpuomm6x3enf4

Modelling and verification of interworking between SIP and H.323

Ligang Wang, Anjali Agarwal, J.William Atwood
2004 Computer Networks  
SIP is a text-based protocol that was designed to work hand in hand with other core Internet protocols such as HTTP.  ...  Modelling and Verification of Interworking between SIP and H.323 Ligang Wang Various standards organizations have considered signaling for voice and video over IP from different approaches.  ...  Model Checking Model checking is a formal method widely used in computer science for verification of concurrent systems, e.g., communication protocols.  ... 
doi:10.1016/j.comnet.2003.12.013 fatcat:qwrvzjbd7jcmfkbua4iqh24h74
« Previous Showing results 1 — 15 out of 106 results