Keyphrases
- access control
- public key infrastructure
- mobile commerce
- mobile payment
- security policies
- mobile devices
- security requirements
- information security
- source code
- mobile applications
- intrusion detection
- mobile phone
- service management
- mobile computing
- mobile learning
- mobile networks
- security issues
- security vulnerabilities
- windows xp
- protection scheme
- open source
- mobile agent system
- fully functional
- java card
- elliptic curve
- security mechanisms
- smart phones
- network security
- mobile computing environment
- ad hoc networking