ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
MIDP 2.0 Style Guide for the Java 2 Platform (The Java Series)
MIDP 2.0 Style Guide for the Java 2 Platform (The Java Series)
Networked Cryptographic Devices Resilient to Capture
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Design and Implementation of a Server-Aided PKI Service (SaPKI)
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Simple Implementation Framework for m-Government Services
ICMB '05 Proceedings of the International Conference on Mobile Business
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Hi-index | 0.00 |
Mobile and wireless technologies are growing without bounds. The extension of eGovernment services with mGovernment ones seems to be next to every day life more than we expect. People percentage having access to mobile devices and nomadic internet connection is rapidly increasing. These devices are used to receiving mails, managing businesses, taking information, playing games, etc. at the same level of confidentiality as watching tv or taking information from a newspaper. In order to surf this new wave of media, access public administrations and business will have to transform their work and services according to this demand creating a circle of convenience and efficiency. In this paper we propose a framework in mobile business transactions, called CNS-Mobile. The aim is to achieve an as flexible as possible interoperable system, granting high security standards, and longevity. CNS-Mobile architecture overcomes problems as limited computational capabilities and limited power of handset and ensures users in the transactions and legal issues.