Despite the system shows already a good performance figures we will optimize the
overall performance in our next research steps. Currently the information server poll
the location database in order to get the current position of all users. In a next step we
will replace this by an event based mechanisms which is provided by the middleware
platform used. In addition we will tune the implementation of the cryptographic op-
erations. This includes the integration of C and assembler programming parts as well
as the integration of hardware accelerators for elliptic curve cryptography. We are also
going to investigate the privacy issues.
References
1. Baumgart, M., Neumann, H., Schweitzer, N.: Optimistische Faire Transaktionen mittels
zeitlich beschr
¨
ankter M
¨
unzen. Verl
¨
assliche IT-Systeme - VIS 2001. Vieweg-Verlag (2001).
2. Brands, S.: Untraceable Off-line Cash in Wallets with Observers. In: Proc. Of Crypto ’93,
Lecture Notes in Computer Science 773. Springer-Verlag.
3. Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Shafi Goldwasser (Ed.):
Advances in Cryptology CRYPTO ’88. Springer-Verlag (1988).
4. Hohl, F., Kubach, U., Leonhardi, A., Schwehm, M., Rothermel, K.: Nexus: An open global
infrastructure for spatial-aware applications. In: Proc. of the fifth International conference on
Mobile Computing and Networking (MobiCom 99). ACM Press (1999).
5. Leonhardi, A., Kubach, A.: An architecture for a distributed universal location service. In:
Proc. of the European Wireless 99 Conference. VDE Verlag (1999).
6. Langend
¨
orfer, P., Dyka, Z., Maye, O., Kraemer, R.: Power Security Architecture for Mobile
Commerce. In: 5th IEEE CAS Workshop on Wireless Communications and Networking.
IEEE Society Press (2002).
7. Langend
¨
orfer, P., Maye, O., Dyka, Z., Sorge, R., Winkler, R., Kraemer, R.: Middleware for
Location-based Services: Design and Implementation Issues. In: Q. Mahmoud (ed): Middle-
ware for Communication. Wiley (2004).
8. Pashtan, A., Blattler, A., Heusser, A., Scheuermann, P.: CATIS: A Context-Aware Tourist
information System. In: Poceedings of the 4th International Workshop of Mobile Computing.
Rostock (Germany), June 17-18, 2003.
9. Petersen, H., Poupard, G.: Efficient scalable fair cash with off-line extortion prevention.
Technical Report LIENS–97–07. May 1997. 33 pages.
10. Piotrowski, K., Langend
¨
orfer, P., Kulikowski, D.: Moneta: An Anonymity Providing Light-
weight Payment System for Mobile Devices. Reviewed Paper. IFIP/GI Workshop on Virtual
Goods. Ilmenau (Germany), May 28-29, 2004.
http://virtualgoods.tu-ilmenau.de/2004/MONETA.pdf (last viewed: January 31, 2005).
11. Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes platform. In: Proceedings of
the Hawaii International Conference on System Sciences (HICSS-36). Big Island, Hawaii,
USA, January 2003.
12. U.S. Department of Commerce / National Institute of Standards and Technology
(NIST): Digital Signature Standard. FIPS PUB 186-2. Federal Information Process-
ing Standards Publication (2000). http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-
change1.pdf (last viewed: January 31, 2005).
13. Wuest, B., Dr
¨
ogehorn, O., David, K.: FAME2: Software Architecture for B3G and 4G Net-
works. In: IST Summit on Mobile and Wireless Communication. Aveiro, Portugal, 2003,
p.837-841
41