Security enhancement of secure USB debugging in Android system.
Mingzhe XuWeiqing SunMansoor AlamPublished in: CCNC (2015)
Keyphrases
- security requirements
- smart card
- security issues
- security mechanisms
- security measures
- security level
- key management
- sensitive data
- authentication protocol
- security management
- security properties
- security analysis
- data security
- security protocols
- malware detection
- security services
- information security
- security model
- security architecture
- data encryption
- user authentication
- cryptographic protocols
- authentication scheme
- key exchange
- public key encryption
- diffie hellman
- security patterns
- stream cipher
- high security
- key exchange protocol
- authentication mechanism
- private key
- encryption scheme
- security policies
- key agreement protocol
- mobile devices
- digital signature scheme
- trusted computing
- data transmission
- identity management
- key establishment
- electronic voting
- network security
- resource constrained
- public key
- access control
- factor authentication
- integrity verification
- key distribution
- key management scheme
- intrusion detection
- mobile agent system
- previously mentioned
- public key cryptography
- elliptic curve
- key agreement
- secure communication
- secure multiparty computation
- provably secure
- mobile applications
- digital signature
- java card
- rfid systems