Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Second IEEE International Workshop on Mobile Commerce and Services

19-19 July 2005

Filter Results

Displaying Results 1 - 25 of 29
  • Second IEEE International Workshop on Mobile Commerce and Services - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Title Page

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Table of contents

    Publication Year: 2005, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Message from WMCS’05 Workshop Chairs

    Publication Year: 2005, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2005, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • User Expectations for Simple Mobile Ubiquitous Computing Environments

    Publication Year: 2005, Page(s):2 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    In mobile ubiquitous computing environments, users will be able to interact with different devices, providing them with many services. The technological heterogeneity of these environments is expected to increase overall system complexity. Flexibility and adaptability thus become key requirements. The goal of the IST-Simplicity project is to design, develop and evaluate an architectural framework ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Roadmap to Ambient e-Service

    Publication Year: 2005, Page(s):11 - 20
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Mobile Services: Balancing Customer and Network Value

    Publication Year: 2005, Page(s):21 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Designing mobile services and the business models behind them is a complex undertaking. A business model can be seen as a blueprint of four interrelated components: service offering, technical architecture, and organizational and financial arrangements. How these different components are related to one another, is hardly been object of research. In this paper the connections between these componen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Humancentric Applications of RFID Implants: The Usability Contexts of Control, Convenience and Care

    Publication Year: 2005, Page(s):32 - 41
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. This paper utilizes usabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking Wireless LAN Location Systems Wireless LAN Location Systems

    Publication Year: 2005, Page(s):42 - 51
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Wireless LANs not only provide an affective means of communication, but also allow to extract information about the location of mobile stations. Numerous wireless LAN location systems have been proposed in the past, yet it is difficult to compare the performance of different systems, since the conditions under which these systems are evaluated differ considerably. Hence, the accuracy information p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Sensor System for Mobile Services with Vision Enhanced Object and Location Awareness

    Publication Year: 2005, Page(s):52 - 59
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    We describe a system which proposes a solution for multi-sensor object awareness and positioning to enable stable location awareness for a mobile service in urban areas. The system offers technology of outdoors vision based object recognition that will extend state-of-the-art location and context aware services towards object based awareness in urban environments. In the proposed application scena... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Pattern Analysis of Secure Migration and Communications in eCommerce using Cryptographic Protocols on a Mobile MAS Platform

    Publication Year: 2005, Page(s):60 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Mobile multi-agent systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper, we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using The GSM/UMTS SIM to Secure Web Services

    Publication Year: 2005, Page(s):70 - 78
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In this paper we present a mobile operator endorsed authentication and payment platform for the consumption of Web services by a mobile station. We propose a protocol where the mobile operator plays the role of dusted third party to issue authentication and authenticated payment authorisation tokens to facilitate a transaction between a mobile station and a Web service provider. We consider the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Modification of ASK Mobile Security Protocol

    Publication Year: 2005, Page(s):79 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Challenges of Location-Aware Mobile Business

    Publication Year: 2005, Page(s):84 - 95
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In addition to mobility, the ability of context awareness and especially location awareness has greatly enhanced the opportunities of mobile businesses. Many different kinds of context-aware services ranging from "finding nearby restaurants" to "sending ambulances to people in emergency" have already taken their places in the business. Besides availability and quality of the service, the user acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Efficiency of Decreasing Payment Amounts in Mobile Commerce and Ubiquitous Computing

    Publication Year: 2005, Page(s):96 - 101
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated "microservices" (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of margina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P-Paid: A Peer-to-Peer Wireless Payment System

    Publication Year: 2005, Page(s):102 - 111
    Cited by:  Papers (14)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    The fast advance of wireless networking, communication, and mobile technology is making a big impact on daily life. The significant increase of mobile device users has caused a strong demand for secured wireless information services and reliable mobile commerce applications. Since wireless payment is a critical part of most wireless information services and mobile commerce applications, generating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Application of E-Commerce inWireless Network

    Publication Year: 2005, Page(s):112 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • m-Mag: The Mobile Magazine Services Platform

    Publication Year: 2005, Page(s):122 - 129
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The m-Mag platform advances the state of the art in mobile services by bridging the gap between mobile Operators and content Publishers, enabling the creation of a new category of mobile service called a mobile magazine. An m-Mag mobile magazine is a next generation mobile publishing service that is made available from a mobile operator's portal, that is integrated with value added mobile data ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalization of End User Software on Mobile Devices

    Publication Year: 2005, Page(s):130 - 137
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Applications for mobile devices, especially mobile phones, are rarely used today - apart from games. They neither take the special features of each device into account nor the individuality of the user who usually has a much closer emotional relationship to her mobile phone than to many other technical devices. Useful and successful mobile applications can thus be presumably only those that addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution for Hybrid Bandwidth Variation in Wireless Video Environments

    Publication Year: 2005, Page(s):138 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    With the development of broadband wireless networks, high efficiency of wireless video transmission has been received increasingly greater attentions than before. One should settle the problems of high-compression efficiency and that of adaptation to the random variation of transmission bandwidth, as well as a network friendly design, in wireless environments. SP (Synchronization-Predictive) frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A profit maximizing distribution strategy for context-aware services

    Publication Year: 2005, Page(s):144 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Large scale mobile commerce applications need to be replicated and distributed to offer an appropriate quality of service to a large audience. In this context, a very important question is when and where replicas should be placed. In this article we present a new distribution strategy for applications in content delivery networks (CDNs). It is intended to be used especially for context-aware servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LOC3 Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures

    Publication Year: 2005, Page(s):154 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    The following paper proposes a new approach for providing localisation of mobile subscribers. Since various different localisation technologies have entered the mobile mass-market, mobile applications requiring location information are increasingly challenged by the complexity of selecting and accessing appropriate localisation sources. Addressing this development, an integrative platform is propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of A Personal and Intelligent Pervasive-Commerce System Architecture

    Publication Year: 2005, Page(s):163 - 173
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    This paper studies the paradigm of pervasive commerce (p-commerce) and presents the design of a p-commerce system architecture which consists of e-commerce servers and store sensors. The architecture includes a personal device, PAM (Pervasive Activity Manager), that allows a user to interact with the smart e-commerce environment. PAM can be used to automatically collect sensor information, manage ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.