Fraunhofer-Gesellschaft

Displaying 1-11 of 11 results

  • White Papers // Apr 2013

    On the Effectiveness of Malware Protection on Android: An Evaluation of Android Antivirus Apps

    Android is currently the most popular Smartphone operating system. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antivirus software promises to effectively protect against malware on mobile devices and many products are available for...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Apr 2013

    On the Effectiveness of Malware Protection on Android: An Evaluation of Android Antivirus Apps Version 1.0

    Android is currently the most popular Smartphone operating system. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antivirus software promises to effectively protect against malware on mobile devices and many products are available for...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jan 2012

    Towards a Reference Architecture for an Integration Platform for Diverse Smart Object Technologies

    Although the cost-effective integration of diverse smart object technologies like Radio-Frequency IDentification (RFID), Real-Time Locating Systems (RTLS), and Wireless Sensor Networks (WSN) into existing enterprise infrastructures is very important for companies, integration aspects are ignored by researches frequently. Furthermore, it could be observed, that existing commercial middleware products aiming at...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Mar 2011

    Reliable, Real-Time Routing in Wireless Sensor and Actuator Networks

    Wireless Sensor Networks (WSNs) have moved into real-world applications, and their extension to Wireless Sensor and Actuator Networks (WSANs) is in progress. Traditional application areas for WSNs include building automation, environmental monitoring, and habitat monitoring, and one major challenge is to cope with the energy limitations of the battery-powered sensor...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jan 2011

    A Hybrid Content Location Approach Between Structured and Unstructured Topology

    The efficient lookup of content is one of the fundamental issues in ad hoc networks. The absence of centralized responsibility, dynamism of environment, and instability of radio links make the content location in large-scale ad hoc networks a challenging task. Recently, the research effort in peer-to-peer networks has shown that...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Mar 2010

    Secure Automotive On-Board Electronics Network Architecture

    This paper introduces hardware and software components for secure automotive on-board networks providing the basis for the protection of external vehicle communication. It is based on work done within the European research project EVITA (http://evitaproject. org). It provides a framework that covers cross-layer security, targeting platform integrity, communication channels, access...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jul 2009

    Control and Data Acquisition of Automated Multi-Sensor Systems in Civil Engineering

    A combination of different non-destructive test methods is often necessary to receive reliable results for material characterization, flaw detection and the determination of component specific geometry parameters. Concerning concrete structures, thickness measurements combined with flaw detection and additional information about reinforcement and tendon ducts are needed. Therefore, a multi-sensor measurement...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jun 2009

    Verifying X.509 Certificates on Smart Cards

    Smart cards are used as tamper-resistant devices for creating digital signatures, but usually not for verifying digital signatures of unknown origin. A reason for this is the difficulty of verifying X.509 certificates, i.e. electronic documents in the format defined in the ITU-T recommendation X.509 for binding a public key to...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // May 2009

    Personal Navigator for a Public Transport System Using RFID Ticketing

    RFID-based public transport ticketing systems rely on widespread networks of RFID readers that locate the user within the transport network in real time to be able to verify whether he can travel at that time with the ticket he holds. This paper presents a system that uses that same RFID-based...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Sep 2008

    BlackBerry Device Bluetooth Interface Security

    This paper provides an overview of the results regarding the Bluetooth interface security characteristics evaluated in the third project. It has to be considered that the evaluation of the BlackBerry device Bluetooth interface security has been one work item during the overall assessment. The evaluation depth of the Bluetooth interface...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // May 2008

    Semantic System Integration - Incorporating Rulebased Semantic Bridges Into BPEL Processes

    This paper describes how semantic bridges realized in terms of rule-based ontology mappings can be incorporated into BPEL processes. The approach is explained by applying it to a semantic system integration scenario in the eBusiness domain defined as the "Purchase order mediation" scenario in the context of the Semantic Web...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Apr 2013

    On the Effectiveness of Malware Protection on Android: An Evaluation of Android Antivirus Apps

    Android is currently the most popular Smartphone operating system. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antivirus software promises to effectively protect against malware on mobile devices and many products are available for...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Apr 2013

    On the Effectiveness of Malware Protection on Android: An Evaluation of Android Antivirus Apps Version 1.0

    Android is currently the most popular Smartphone operating system. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antivirus software promises to effectively protect against malware on mobile devices and many products are available for...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // May 2009

    Personal Navigator for a Public Transport System Using RFID Ticketing

    RFID-based public transport ticketing systems rely on widespread networks of RFID readers that locate the user within the transport network in real time to be able to verify whether he can travel at that time with the ticket he holds. This paper presents a system that uses that same RFID-based...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Sep 2008

    BlackBerry Device Bluetooth Interface Security

    This paper provides an overview of the results regarding the Bluetooth interface security characteristics evaluated in the third project. It has to be considered that the evaluation of the BlackBerry device Bluetooth interface security has been one work item during the overall assessment. The evaluation depth of the Bluetooth interface...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // May 2008

    Semantic System Integration - Incorporating Rulebased Semantic Bridges Into BPEL Processes

    This paper describes how semantic bridges realized in terms of rule-based ontology mappings can be incorporated into BPEL processes. The approach is explained by applying it to a semantic system integration scenario in the eBusiness domain defined as the "Purchase order mediation" scenario in the context of the Semantic Web...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jul 2009

    Control and Data Acquisition of Automated Multi-Sensor Systems in Civil Engineering

    A combination of different non-destructive test methods is often necessary to receive reliable results for material characterization, flaw detection and the determination of component specific geometry parameters. Concerning concrete structures, thickness measurements combined with flaw detection and additional information about reinforcement and tendon ducts are needed. Therefore, a multi-sensor measurement...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Mar 2010

    Secure Automotive On-Board Electronics Network Architecture

    This paper introduces hardware and software components for secure automotive on-board networks providing the basis for the protection of external vehicle communication. It is based on work done within the European research project EVITA (http://evitaproject. org). It provides a framework that covers cross-layer security, targeting platform integrity, communication channels, access...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jun 2009

    Verifying X.509 Certificates on Smart Cards

    Smart cards are used as tamper-resistant devices for creating digital signatures, but usually not for verifying digital signatures of unknown origin. A reason for this is the difficulty of verifying X.509 certificates, i.e. electronic documents in the format defined in the ITU-T recommendation X.509 for binding a public key to...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jan 2011

    A Hybrid Content Location Approach Between Structured and Unstructured Topology

    The efficient lookup of content is one of the fundamental issues in ad hoc networks. The absence of centralized responsibility, dynamism of environment, and instability of radio links make the content location in large-scale ad hoc networks a challenging task. Recently, the research effort in peer-to-peer networks has shown that...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Mar 2011

    Reliable, Real-Time Routing in Wireless Sensor and Actuator Networks

    Wireless Sensor Networks (WSNs) have moved into real-world applications, and their extension to Wireless Sensor and Actuator Networks (WSANs) is in progress. Traditional application areas for WSNs include building automation, environmental monitoring, and habitat monitoring, and one major challenge is to cope with the energy limitations of the battery-powered sensor...

    Provided By Fraunhofer-Gesellschaft

  • White Papers // Jan 2012

    Towards a Reference Architecture for an Integration Platform for Diverse Smart Object Technologies

    Although the cost-effective integration of diverse smart object technologies like Radio-Frequency IDentification (RFID), Real-Time Locating Systems (RTLS), and Wireless Sensor Networks (WSN) into existing enterprise infrastructures is very important for companies, integration aspects are ignored by researches frequently. Furthermore, it could be observed, that existing commercial middleware products aiming at...

    Provided By Fraunhofer-Gesellschaft