With the development of IT convergence technologies to improve quality of life, users can now more easily access useful information. A convergence system represents an environment that is able to provide personal services by configuring various devices and sensors based on both wire and wireless networks. Further, diverse and far-reaching information is being produced fast and distributed instantly in digitized format. Studies on mobile computing are continuously presenting more efficient ways of delivering information to more users. Mobile computing is a technology that provides a service automatically based on perceived situational information in personal and ubiquitous environments. Ubiquitous computing is characterized by users who are focused on a virtual space established by computers and networks. However, mobile computing groups of computers work through various sensors that exist in the real world. Users are able to receive various personal services using many different types of mobile computing resources within an internal/external space, without limitations in time or space [1,2]. Previously, users had to convey their intentions using standard input devices and obtain the results on an output device. On the contrary, in a distributed and mobile computing environment, lifelog, sensors, big data, and computing resources are ubiquitous in a user's everyday life. To provide personal services according to various lifestyles, these computing resources should be aware of a user's intentions and the surrounding environment, as well as provide optimal services [3, 4].• Mobile Applications and Convergence System This special issue has become one of the hottest topics in mobile computing and future networks. We believe that this special issue will have a high citation in the areas of personal and ubiquitous computing.A study by Lee et al. presented an IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. They designed and constructed a network based on real mobile nodes, modeled an IKEv2 protocol through the simulation, analyzed authentication key resetting and rekeying of the IKEv2 protocol in a MIPv6 network, and experimented with the effects of limited bandwidth on key exchange with analysis data. As a result of the experiment, it was confirmed that the rekeying value was a little faster than initializing, and then, the router disconnection was recognized as the handover process and performed
A brief description of each paper follows. The paper by Choi et al. [1] details how to strengthen security awareness programs based on an RFID access control system for inside information leakage prevention. For this purpose, Multimed Tools Appl (2015) 74:8921-8926
Welcome to the special issue of Wireless Personal Communications. This special issue contains a collection of the best papers from the 2nd International Conference on IT convergence and Security which was held in Pyeongchang, Korea from December 5th to 7th, 2012.The main goal of International Conference on IT convergence and Security is to bring together researchers from academia and practitioners from different industries to share ideas, problems, as well as solutions. This conference also aimed to meet the demands of the academia and practitioners from related industries, where we believe it is one of the most comprehensive conferences focused on solving problems occurring in industrial computing environments and providing high-demand technology.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.