The adaptation of Shamir's protocol for increasing the security of a mobile environment.
Janis BulsImants GorbansIvans KulesovsUldis StraujumsPublished in: CoRR (2015)
Keyphrases
- smart card
- authentication protocol
- mobile environments
- secret key
- security requirements
- cryptographic protocols
- mobile devices
- mobile computing
- key management
- mobile users
- context aware
- location dependent
- mobile applications
- computing environments
- mobile computing environment
- security protocols
- data dissemination
- mobile agents
- mobile objects
- location based services
- intrusion detection
- secret sharing scheme
- database