Login / Signup
Model-based security analysis for mobile communications.
Jan Jürjens
Jörg Schreck
Peter Bartmann
Published in:
ICSE (2008)
Keyphrases
</>
security analysis
mobile communications
smart card
wireless networks
public key
ubiquitous computing
distributed computing
mobile computing
security requirements
future trends
wifi
user authentication
encryption scheme
intelligent transportation systems
mobile devices
low cost