Mobile computing is one of the biggest issues of computer technology, science and industry today. This book looks at the requirements of developing mobile computing systems and the challenges they pose to computer designers. It examines the requirements of mobile computing hardware, infrastructure and communications services. Information security and the data protection aspects of design are considered, together with telecommunications facilities for linking up to the worldwide computer infrastructure. The book also considers the mobility of computer users versus the portability of the equipment. The text also examines current applications of mobile computing in the public sector and future innovative applications.
Foreword v(1) Introduction vi Keynote Paper 1 Trends of flat displays in the multimedia age 3(4) H. Sasaki TRACK 1 MOBILE TECHNOLOGY, TOOLS AND APPLICATIONS 7(232) PART ONE System Support for Mobile Communications 7(14) Invited Paper 9(12) 2 System support and applications for mobile computing 9(2) N. Diehl 3 Developments in mobile data system technology - particularly GSM 11(10) J. Leske PART TWO Caching and Replication for Mobile Communications 21(18) 4 Replication-support for advanced mobile applications 23(8) D. Kottmann 5 Caching data over a broadcast channel 31(8) H. V. Leong A. Si B. Y. L. Chan PART THREE Basic Architectures for Mobile Information Systems 39(28) 6 Mobile frames: a pragmatic approach to automatic application partitioning based on an end-user data model 41(9) T. Kirste 7 Generic personal communications support for open service environments 50(17) T. Eckardt T. Magedanz C. Ulbricht R. Popescu-Zeletin PART FOUR Mobile Agents and Multimedia Applications 67(42) Invited Paper 69(40) 8 Supporting user mobility 69(9) M. Brown 9 Designing secure agents with O.O. technologies for users mobility 78(8) D. Carlier P. Trane 10 The idea: integrating authoring concepts for mobile agents into an authoring tool for active multimedia mail 86(12) J. Schirmer T. Kirste 11 Animation within mobile multimedia on-line services 98(11) C. Belz M. Bergold H. Hackelmann R. Strack PART FIVE Networking and Protocols for Mobile Communication 109(18) 12 Theoretical analyses of data communications integrated into cordless voice channels 111(8) R. Canchi Y. Akaiwa 13 Random access, reservation and polling multiaccess protocol for wireless data systems 119(8) T. Buot PART SIX Methods and Algorithms for Mobile Information Access 127(22) Invited Paper 129(20) 14 Challenges in mobile information systems and services 129(3) R. Strack 15 A buffer overhead minimization method for multicast-based handoff in picocellular networks 132(9) E. Ha Y. Choi C. Kim 16 Impact of mobility in mobile communication systems 141(8) M. Zonoozi P. Dassanayake PART SEVEN Mobile Communication Architectures 149(30) 17 Mobile computing based on GSM: the Mowgli approach 151(8) T. Alanko M. Kojo H. Laamanen K. Raatikainen M. Tienari 18 An adaptive data distribution system for mobile environments 159(8) S. Kummel A. Schill K. Schumann T. Ziegert 19 Object oriented system architecture and strategies for the exchange of structured multimedia data with mobile hosts 167(12) J. Bonigk U. von Lukas PART EIGHT QoS-Management and Resource Discovery for Mobile Communication 179(60) Invited Paper 181(58) 20 Agent skills and their roles in mobile computing and personal communications 181(24) M. Mendes W. Loyolla T. Magedanz F. M. Assis Silva S. Krause 21 A global QoS management for wireless network 205(14) M. T. Le J. Rabaey 22 Resource discovery protocol for mobile computing 219(20) C. Perkins H. Harjono TRACK 2 TRUSTING IN TECHNOLOGY, AUTHENTICATION, SECURITY 239(100) Invited Paper 239(6) 23 The future of smart cards: technology and application 239(6) V. Cordonnier Industrial State-of-the-Art Report 245(2) 24 Use of smart cards for security applications by Deutsche Telekom 245(2) B. Kowalski PART ONE Protocols for Authentication, Secure Communication and Payment 247(28) 25 An authentication and security protocol for mobile computing 249(9) Y. Zheng 26 Design of secure end-to-end protocols for mobile systems 258(9) V. Varadharajan Y. Mu 27 Yet another simple internet electronic payment system 267(8) J. Zhao C. Dong E. Koch PART TWO General Security Aspects in Mobile Communication 275(24) 28 Difficulties in achieving security in mobile communications 277(8) I. Nurkic 29 GSM digital cellular telephone system: a case study of encryption algorithms 285(14) T. Smith PART THREE New Security Algorithms and Methods 299(22) 30 A new algorithm for smart cards 301(8) C. Marco P. Morillo 31 A new approach to integrity of digital images 309(8) D. Storck Invited Paper 317(4) 32 How to protect multimedia applications 317(4) E. Koch PART FOUR Secure Mobile Applications 321(18) 33 Phone card application and authentication in wireless communications 323(7) C. H. Lee M. S. Hwang W. P. Yang 34 Real-time mobile EFTPOS: challenges and implications of a world first application 330(9) S. R. Elliot Index of Contributors 339(2) Keyword Index 341