Do mobile phone applications foster sustainable mobility?

Author(s):  
Harald Mayr
2020 ◽  
Vol 2020 ◽  
pp. 1483-1484
Author(s):  
Masoumeh Hosseinpour ◽  
◽  
Ralf Terlutter ◽  
Holger Roschk

2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


2006 ◽  
Vol 23 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Nor Shahriza Abdul Karim ◽  
Siti Hawa Darus ◽  
Ramlah Hussin

Author(s):  
Thaísa C. Lacerda ◽  
Juliane V. Nunes ◽  
Christiane Gresse von Wangenheim

In this chapter, we discuss the importance of evaluating the usability of mobile applications using tools and technics that consider their specific characteristics. One common way to evaluate usability is using heuristics. However, since many assumptions regarding usability of computer applications are not true for mobile applications, a question arises: does there exist usability heuristics specific for this type of device? To answer this question, we conducted a systematic literature review. We mapped the encountered sets of heuristics to Nielsen's ten heuristics and identified additional ones specifically proposed for this kind of device. Our review indicates that research with respect to usability heuristics for mobile phones are still sparse. Nevertheless, this chapter provides an overview on the state of the art that can guide the design and evaluation of interfaces for mobile applications as well as provide a starting point for the evolution of such customized heuristics.


Sign in / Sign up

Export Citation Format

Share Document