欢迎来到冰点文库! | 帮助中心 分享价值,成长自我!
冰点文库
全部分类
  • 临时分类>
  • IT计算机>
  • 经管营销>
  • 医药卫生>
  • 自然科学>
  • 农林牧渔>
  • 人文社科>
  • 工程科技>
  • PPT模板>
  • 求职职场>
  • 解决方案>
  • 总结汇报>
  • ImageVerifierCode 换一换
    首页 冰点文库 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    移动通信设备的基础服务应用技术Word下载.docx

    • 资源ID:6083388       资源大小:35.59KB        全文页数:34页
    • 资源格式: DOCX        下载积分:3金币
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    二维码
    微信扫一扫登录
    下载资源需要3金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    移动通信设备的基础服务应用技术Word下载.docx

    1、3.2.4. Mp3 player3.2.5. Photo and video camera3.2.6. IrDA3.2.7. Resilience in water, drops, etc.3.2.8. Design and elegance3.2.9. Sound recording3.2.10. 3G (third generation)3.2.11. Battery life3.2.12. Processing speed3.2.13. Hands-free or Bluetooth earphone, Bluetooth technology3.2.14. Wi-Fi, GPS, s

    2、earch engine, touch screen, voice commands, easy interface3.3. Importance and willingness to pay for applications 3.3.1. Sending and receiving email, sending and receiving MMS3.3.2. Chat, teleconference, Internet navigation3.3.3. Support of open software and variety of files types3.3.4. Encryption a

    3、nd cryptography for exchanging data, common use of files, anti-virus and anti-spam protection, conversion voice-to-text, language translation3.3.5. Calculator, clock, calendar, organizer, reminder3.3.6. Playing games3.3.7. TV watching, printing, viewing maps, locking the keyboard or the touch screen

    4、, locking with password4. Managerial implications 4.1. Design and development4.2. Advertising, marketing and promotion4.3. Training and usage4.4. Pricing4.5. Applications and services5. Conclusions and future researchAppendix A. AppendixA.1. Gender differences found in previous studiesReferencesA mo

    5、bile network operator-independent mobile signature serviceJournal of Network and Computer ApplicationsElectronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secur

    6、e signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM/USIM cards, which are broadly extended, are the ideal devices to create these e-signatures (named mobile signatures or m-signatures). Furthermore, thanks to m-signatures the devel

    7、opment of m-signature-based applications becomes simpler for mobile application/service providers. There are several solutions to create m-signatures. However, current solutions present some problems: either they require that the solution is developed by every mobile network operator or the componen

    8、ts to implement it in the mobile handset are too complex. As a solution to these problems we present an m-signature service that is not linked to a mobile network operator and where the client has more control over the signatures to perform them in an easier way. This paper presents the description

    9、and analysis of this new m-signature service as well as the prototype that is being tested in the University of Murcia.2. Related work 2.1. Server-based solutions2.2. Mobile signature service2.3. Mobile signature application unit3. Mobile network operator-independent mobile signature service 3.1. Ov

    10、erview of the system and its processes3.2. Roles and responsibilities 3.2.1. Mobile network operators3.2.2. MNO-independent mobile signature service provider3.2.3. Certification service provider3.2.4. Mobile service/application provider3.2.5. Mobile user3.3. Flow of acquiring and using an m-signatur

    11、e3.4. Processes 3.4.1. Mobile user certification3.4.2. Mobile user registration at iMSSP3.4.3. MASP registration at iMSSP3.4.4. Mobile signature request and generation3.4.5. Other services3.5. Web services description 3.5.1. iMSSP Web service3.5.2. MASP Web service3.6. Security requirements and anal

    12、ysis 3.6.1. Certification process3.6.2. Mobile user registration at iMSSP3.6.3. MASP registration at iMSSP3.6.4. Mobile signature request and generation3.6.5. Summary of the security properties of the exchanges3.7. Scenarios of application4. Implementation details 4.1. Development environment4.2. Mo

    13、bile client4.3. MNO-independent mobile signature service provider4.4. Mobile application/service provider5. Prototype/scenario of application 5.1. Performance analysis6. Conclusions and future workAcknowledgementsAdding value to the network: Mobile operators experiments with Software-as-a-Service an

    14、d Platform-as-a-Service modelsThe environments of software development and software provision are shifting to web-based platforms supported by Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) models. This paper will make the case that there is equally an opportunity for mobile operators

    15、 to identify additional sources of revenue by exposing network functionalities through web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, mobile operators experiments are compared and similarities with these models are identified. Based on the analysis

    16、of various case studies, this paper argues that mobile operators mobile web services are decisively shifting from SaaS to PaaS models. However, these platforms incorporate fragmentation at several levels and are likely to face future challenges in order to thrive.2. Software-as-a-Service 2.1. Revenu

    17、e models2.2. Benefits and risks3. Platform-as-a-Service 3.1. Revenue models3.2. Benefits and risks4. Success factors for platform adoption5. From SaaS to PaaS: mobile operators approaches6. ConclusionArchitectures for the future networks and the next generation Internet: A surveyComputer Communicati

    18、onsNetworking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and

    19、 activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications e

    20、ven when complete end-to-end path is not available are also discussed.2. Scope3. Security 3.1. Relationship-Oriented Networking 3.1.1. Identities3.1.2. Building and sharing relationships3.1.3. Relationship applications3.2. Security architecture for Networked Enterprises (SANE)3.3. Enabling defense a

    21、nd deterrence through private attribution3.4. Protecting user privacy in a network with ubiquitous computing devices3.5. Pervasive and trustworthy network and service infrastructures3.6. Anti-Spam Research Group (ASRG)4. Content distribution mechanisms 4.1. Next generation CDN4.2. Next generation P2

    22、P4.3. Swarming architecture4.4. Content Centric Networking5. Challenged network environments 5.1. Delay Tolerant Networks (DTN)5.2. Delay/fault tolerant mobile sensor networks (DFT-MSN)5.3. Postcards from the edge5.4. Disaster day after networks (DAN)5.5. Selectively Connected Networking (SCN)6. Net

    23、work monitoring and control architectures 6.1. 4D architecture6.2. Complexity Oblivious Network Management (CONMan)6.3. Maestro6.4. Autonomic network management6.5. In-Network Management (INM)7. Service centric architectures 7.1. Service-Centric End-to-End Abstractions for Network Architecture7.2. S

    24、ILO architecture for services integration, control, and optimization for the future Internet7.3. NetSerV: architecture of a service-virtualized Internet7.4. SLASOI: empowering the Service Economy with SLA-aware Infrastructures7.5. SOA4All: Service-Oriented Architectures for All7.6. Internet 3.0: a m

    25、ulti-tier diversified architecture for the next generation Internet based on object abstraction8. Next generation internetworking architectures 8.1. Algorithmic foundations for Internet architecture: clean slate approach8.2. Greedy routing on hidden metrics (GROH Model)8.3. HLP: hybrid link state path-vector inter-domain routing8.4. eFIT 94 enabling future Internet innovations through transit wire8.5. Postmodern internetwork architecture8.6. ID-locater split architectures 8.6.1. HIP8


    注意事项

    本文(移动通信设备的基础服务应用技术Word下载.docx)为本站会员主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 冰点文库 网站版权所有

    经营许可证编号:鄂ICP备19020893号-2


    收起
    展开