Security by mobility in location and track verification.
Matthias SchäferDaniel S. BergerVincent LendersJens B. SchmittPublished in: WISEC (2015)
Keyphrases
- high security
- mobility patterns
- java card
- integrity verification
- information security
- cryptographic protocols
- security requirements
- intrusion detection
- high assurance
- human mobility
- location prediction
- security issues
- access control
- model checking
- smart card
- mobile users
- security problems
- security protocols
- location information
- security level
- mobile agents
- network security
- location based services
- cyber security
- static analysis
- statistical databases
- mobile networks
- security systems
- security analysis
- security threats
- key management
- security mechanisms
- encryption scheme
- formal analysis