This thesis describes scenarios in which a mobile user needs various services, such as Internet telephony, secure printing and online data services in a number of places. From these scenarios we summarize the requirements for quality of service control, service discovery, user authentication and authorization, service access control, and user privacy. In order to implement a prototype to support service discovery, we studied different technologies including Bluetooth, Jini, and Web Services. SDPtool from BlueZ was chosen to limit the search range within the user's local area while using minimal power consumption. Also included in the implementation, the Session Initiation Protocol is used to initiate the session and exchange messages while ...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) a...
Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computin...
Copyright © 2013 Raimund K. Ege. This is an open access article distributed under the Creative Commo...
The GSM technologies plays vital role in pervasive computing environments. The open and dynamic natu...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Multimedia content delivery to capable smart phones with high-speed next-generation Internet connect...
Mobile transactions have been in development for around ten years. More and more initiatives and eff...
In Application Service Providing (ASP) frameworks security is one of the most important issues. Curr...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
The development of wireless technologies grants a user equipped with a portable wireless device the ...
This dissertation studies user acceptance of mobile services based on a series of case studies of mo...
[[abstract]]With the rapid development of the information technology, people’s demand for the mobile...
security, local wireless, nomadic We present a protocol that enables mobile clients to be authentica...
Basic web services are widely being accessed from smart phones due to the advances in wireless devic...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) a...
Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computin...
Copyright © 2013 Raimund K. Ege. This is an open access article distributed under the Creative Commo...
The GSM technologies plays vital role in pervasive computing environments. The open and dynamic natu...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Multimedia content delivery to capable smart phones with high-speed next-generation Internet connect...
Mobile transactions have been in development for around ten years. More and more initiatives and eff...
In Application Service Providing (ASP) frameworks security is one of the most important issues. Curr...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
The development of wireless technologies grants a user equipped with a portable wireless device the ...
This dissertation studies user acceptance of mobile services based on a series of case studies of mo...
[[abstract]]With the rapid development of the information technology, people’s demand for the mobile...
security, local wireless, nomadic We present a protocol that enables mobile clients to be authentica...
Basic web services are widely being accessed from smart phones due to the advances in wireless devic...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) a...
Mobile phones have evolved from simple voice terminals into highly-capable, general-purpose computin...