JXTA Security in Mobile Constrained Devices.
Marc Domingo-PrietoJoan Arnedo-MorenoJordi Herrera-JoancomartíPublished in: AINA Workshops (2010)
Keyphrases
- mobile devices
- smart phones
- mobile applications
- wearable devices
- handheld devices
- mobile phone
- mobile commerce
- mobile agent system
- mobile computing environment
- information security
- mobile computing
- mobile terminals
- hand held devices
- portable devices
- wireless technologies
- mobile internet
- camera phones
- context aware
- mobile environments
- access control
- small screen
- security issues
- mobile learning
- mobile payment
- factor authentication
- security requirements
- communication technologies
- m learning
- statistical databases
- security policies
- mobile technologies
- location aware
- wireless devices
- wireless internet
- mobile users
- mobile networks
- tablet pc
- content adaptation
- network security
- embedded systems
- wireless networks
- intrusion detection
- low cost