Mobile Security: Two Generations of Potential Victims.
Blaz MarkeljSabina ZgagaPublished in: CECC (2017)
Keyphrases
- access control
- context aware
- security systems
- key management
- mobile phone
- intrusion detection
- information security
- mobile computing
- mobile internet
- statistical databases
- security issues
- encryption scheme
- situation awareness
- security risks
- ad hoc networking
- mobile computing environment
- information systems
- mobile commerce
- security policies
- mobile learning
- mobile devices