A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

Author(s):  
Stephen Badan ◽  
Julien Probst ◽  
Markus Jaton ◽  
Damien Vionnet ◽  
Jean-Frédéric Wagen ◽  
...  
Compiler ◽  
2013 ◽  
Vol 2 (1) ◽  
Author(s):  
Novrianto Novrianto ◽  
Sumarsono Sumarsono ◽  
Yuliani Indrianingsih

Information regarding the admission of new students in a school is very important to support the smooth reception o f new students. Good information distribution process, will improve the quality of education in a school. Application o f these new students is a solution that can parents help their parents in distributing information about the graduation o f their students in a school. The application supports the announcement o f the distribution process before the announcement o f new admissions at the school run. This application was developed using Java programming language, assisted by Net.bin for Android Operating System environment. This method is based on client-server, where mobile devices like cell phones or netbooks as a web server as a client and server. Parents are parents who have Android-based mobile devices, can use this application to support the admission o f new students. Android mobile applications can make it easier for parents to see the announcement o f new admissions, thereby saving time getting to know their students are accepted or not on SMA High Abung, North Lampung.


Author(s):  
Ying Mao

With the prevalence of smartphones, the scope of mobile applications has been significantly broadened in the past few years including almost every aspect of our daily life. Among the applications, message dissemination services play a significant role. Traditionally, users send messages to the servers, which forward them according to friend lists. This client-server architecture is efficient with the support of infrastructures, however, it restricts the application scope and may hinder the wide deployment of location-based mobile applications. This paper proposes a novel communication model called passive broadcast for local message dissemination. In this new model, each node does not maintain a connection state and data delivery is initialized by a receiver via a ’scan’ operation. The representative carriers of passive broadcast include Bluetooth and WiFi-Direct, both of which define a mandatory ‘peer discovery’ function. Passive broadcast features negligible cost for establishing and maintaining direct links and is extremely suitable for short message dissemination in proximity. Furthermore, we study the operation management in the proposed communication model with complete protocols and in-depth analysis for optimization. We prototyped our solution on commercial phones and evaluated it with extensive experiments and simulation.


2018 ◽  
Vol 1 (1) ◽  
pp. 25-32
Author(s):  
Rabby Nazli

The faster technological development makes it easier for us to carry out life activities more easily. currently mobile applications have not been used so much in a lecture that an application is needed that can meet these shortcomings. For that I try to model a mobile application that can help lecturers and students in sharing learning material at each meeting so as to facilitate the process of a lecture. Which is based on client server where this application can change its data at any time according to the user's height and will be modeled using the Unifield Modeling Language (UML) tool.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


2017 ◽  
Vol 2017 (4) ◽  
pp. 177-197 ◽  
Author(s):  
Ágnes Kiss ◽  
Jian Liu ◽  
Thomas Schneider ◽  
N. Asokan ◽  
Benny Pinkas

Abstract Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-sensitive scenarios. For decades, researchers have been focusing on improving its efficiency in both communication and computation. However, most of the existing solutions are inefficient for an unequal number of inputs, which is common in conventional client-server settings. In this paper, we analyze and optimize the efficiency of existing PSI protocols to support precomputation so that they can efficiently deal with such input sets. We transform four existing PSI protocols into the precomputation form such that in the setup phase the communication is linear only in the size of the larger input set, while in the online phase the communication is linear in the size of the smaller input set. We implement all four protocols and run experiments between two PCs and between a PC and a smartphone and give a systematic comparison of their performance. Our experiments show that a protocol based on securely evaluating a garbled AES circuit achieves the fastest setup time by several orders of magnitudes, and the fastest online time in the PC setting where AES-NI acceleration is available. In the mobile setting, the fastest online time is achieved by a protocol based on the Diffie-Hellman assumption.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


2019 ◽  
Vol 11 (1) ◽  
pp. 98-109
Author(s):  
Amras Mauluddin ◽  
Uray Yufikar

Currently education and poverty is a problem as it gives an enormous impact on people's lives. As we can see, the number of school dropouts has increased every day. Seeing this condition, Gerakan Bantu Seribu Anak Asuh (GBSA)  is present to participate to help children who are less fortunate, to be able to stay in school. Gerakan Bantu Seribu Anak Asuh (GBSA) is a social community that bridges donors and children who are less fortunate to get help. In reality this donation management faced several obstacles both in terms of data management to the confirmation process donations made by donors each donating. Therefore, by presenting the android-based mobile applications is expected to be a solution to help officers GBSA share information and manage the donations were mandated as well as for donors could further facilitate the process of sharing and confirmation. Applications software development methods that will be used the method of Rapid Application Development (RAD). This method is one method used to develop apalikasi android with short cycles thereby enabling much faster. After testing with a method black box can be concluded that the system is in conformity with the expected goals.


2018 ◽  
Vol 10 (1) ◽  
Author(s):  
V. Solovei ◽  
O. Olshevska ◽  
Y. Bortsova

Today most of desktop and mobile applications have analogues in the form of web-based applications.  With evolution of development technologies and web technologies web application increased in functionality to desktop applications. The Web application consists of two parts of the client part and the server part. The client part is responsible for providing the user with visual information through the browser. The server part is responsible for processing and storing data.MPA appeared simultaneously with the Internet. Multiple-page applications work in a "traditional" way. Every change eg. display the data or submit data back to the server. With the advent of AJAX, MPA learned to load not the whole page, but only a part of it, which eventually led to the appearance of the SPA. SPA is the principle of development when only one page is transferred to the client part, and the content is downloaded only to a certain part of the page, without rebooting it, which allows to speed up the application and simplify the user experience of using the application to the level of desktop applications.Based on the SPA, the Mechatronics Robot Laboratory ONAFT application was designed to automate the management process. The application implements the client-server architecture. The server part consists of a RESTful API, which allows you to get unified access to the application functionality, and a database for storing information. Since the client part is a spa, this allows you to reduce the load on the connection to the server and improve the user experience


Sign in / Sign up

Export Citation Format

Share Document