1、3.2.4. Mp3 player3.2.5. Photo and video camera3.2.6. IrDA3.2.7. Resilience in water, drops, etc.3.2.8. Design and elegance3.2.9. Sound recording3.2.10. 3G (third generation)3.2.11. Battery life3.2.12. Processing speed3.2.13. Hands-free or Bluetooth earphone, Bluetooth technology3.2.14. Wi-Fi, GPS, s
2、earch engine, touch screen, voice commands, easy interface3.3. Importance and willingness to pay for applications 3.3.1. Sending and receiving email, sending and receiving MMS3.3.2. Chat, teleconference, Internet navigation3.3.3. Support of open software and variety of files types3.3.4. Encryption a
3、nd cryptography for exchanging data, common use of files, anti-virus and anti-spam protection, conversion voice-to-text, language translation3.3.5. Calculator, clock, calendar, organizer, reminder3.3.6. Playing games3.3.7. TV watching, printing, viewing maps, locking the keyboard or the touch screen
4、, locking with password4. Managerial implications 4.1. Design and development4.2. Advertising, marketing and promotion4.3. Training and usage4.4. Pricing4.5. Applications and services5. Conclusions and future researchAppendix A. AppendixA.1. Gender differences found in previous studiesReferencesA mo
5、bile network operator-independent mobile signature serviceJournal of Network and Computer ApplicationsElectronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secur
6、e signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM/USIM cards, which are broadly extended, are the ideal devices to create these e-signatures (named mobile signatures or m-signatures). Furthermore, thanks to m-signatures the devel
7、opment of m-signature-based applications becomes simpler for mobile application/service providers. There are several solutions to create m-signatures. However, current solutions present some problems: either they require that the solution is developed by every mobile network operator or the componen
8、ts to implement it in the mobile handset are too complex. As a solution to these problems we present an m-signature service that is not linked to a mobile network operator and where the client has more control over the signatures to perform them in an easier way. This paper presents the description
9、and analysis of this new m-signature service as well as the prototype that is being tested in the University of Murcia.2. Related work 2.1. Server-based solutions2.2. Mobile signature service2.3. Mobile signature application unit3. Mobile network operator-independent mobile signature service 3.1. Ov
10、erview of the system and its processes3.2. Roles and responsibilities 3.2.1. Mobile network operators3.2.2. MNO-independent mobile signature service provider3.2.3. Certification service provider3.2.4. Mobile service/application provider3.2.5. Mobile user3.3. Flow of acquiring and using an m-signatur
11、e3.4. Processes 3.4.1. Mobile user certification3.4.2. Mobile user registration at iMSSP3.4.3. MASP registration at iMSSP3.4.4. Mobile signature request and generation3.4.5. Other services3.5. Web services description 3.5.1. iMSSP Web service3.5.2. MASP Web service3.6. Security requirements and anal
12、ysis 3.6.1. Certification process3.6.2. Mobile user registration at iMSSP3.6.3. MASP registration at iMSSP3.6.4. Mobile signature request and generation3.6.5. Summary of the security properties of the exchanges3.7. Scenarios of application4. Implementation details 4.1. Development environment4.2. Mo
13、bile client4.3. MNO-independent mobile signature service provider4.4. Mobile application/service provider5. Prototype/scenario of application 5.1. Performance analysis6. Conclusions and future workAcknowledgementsAdding value to the network: Mobile operators experiments with Software-as-a-Service an
14、d Platform-as-a-Service modelsThe environments of software development and software provision are shifting to web-based platforms supported by Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) models. This paper will make the case that there is equally an opportunity for mobile operators
15、 to identify additional sources of revenue by exposing network functionalities through web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, mobile operators experiments are compared and similarities with these models are identified. Based on the analysis
16、of various case studies, this paper argues that mobile operators mobile web services are decisively shifting from SaaS to PaaS models. However, these platforms incorporate fragmentation at several levels and are likely to face future challenges in order to thrive.2. Software-as-a-Service 2.1. Revenu
17、e models2.2. Benefits and risks3. Platform-as-a-Service 3.1. Revenue models3.2. Benefits and risks4. Success factors for platform adoption5. From SaaS to PaaS: mobile operators approaches6. ConclusionArchitectures for the future networks and the next generation Internet: A surveyComputer Communicati
18、onsNetworking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and
19、 activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications e
20、ven when complete end-to-end path is not available are also discussed.2. Scope3. Security 3.1. Relationship-Oriented Networking 3.1.1. Identities3.1.2. Building and sharing relationships3.1.3. Relationship applications3.2. Security architecture for Networked Enterprises (SANE)3.3. Enabling defense a
21、nd deterrence through private attribution3.4. Protecting user privacy in a network with ubiquitous computing devices3.5. Pervasive and trustworthy network and service infrastructures3.6. Anti-Spam Research Group (ASRG)4. Content distribution mechanisms 4.1. Next generation CDN4.2. Next generation P2
22、P4.3. Swarming architecture4.4. Content Centric Networking5. Challenged network environments 5.1. Delay Tolerant Networks (DTN)5.2. Delay/fault tolerant mobile sensor networks (DFT-MSN)5.3. Postcards from the edge5.4. Disaster day after networks (DAN)5.5. Selectively Connected Networking (SCN)6. Net
23、work monitoring and control architectures 6.1. 4D architecture6.2. Complexity Oblivious Network Management (CONMan)6.3. Maestro6.4. Autonomic network management6.5. In-Network Management (INM)7. Service centric architectures 7.1. Service-Centric End-to-End Abstractions for Network Architecture7.2. S
24、ILO architecture for services integration, control, and optimization for the future Internet7.3. NetSerV: architecture of a service-virtualized Internet7.4. SLASOI: empowering the Service Economy with SLA-aware Infrastructures7.5. SOA4All: Service-Oriented Architectures for All7.6. Internet 3.0: a m
25、ulti-tier diversified architecture for the next generation Internet based on object abstraction8. Next generation internetworking architectures 8.1. Algorithmic foundations for Internet architecture: clean slate approach8.2. Greedy routing on hidden metrics (GROH Model)8.3. HLP: hybrid link state path-vector inter-domain routing8.4. eFIT 94 enabling future Internet innovations through transit wire8.5. Postmodern internetwork architecture8.6. ID-locater split architectures 8.6.1. HIP8