A security analysis of smartphone data flow and feasible solutions for lawful interception.
Mithun PaulNitin Singh ChauhanAshutosh SaxenaPublished in: IAS (2011)
Keyphrases
- data flow
- feasible solution
- security analysis
- linear programming
- tabu search
- database machine
- objective function
- optimal solution
- public key
- smart card
- security requirements
- control flow
- mathematical model
- convex hull
- user authentication
- encryption scheme
- simulated annealing
- metaheuristic
- particle swarm optimization
- object oriented
- search space
- infeasible solutions