Login / Signup
How Secure Personal Mobility Can Be?
Sandor Vincze
Published in:
ICCSA (1) (2003)
Keyphrases
</>
personal information
mobility patterns
mobile users
mobile networks
security mechanisms
human mobility
security analysis
security protocols
standard model
scalar product
data sets
data encryption
authentication scheme
security level
key management
sensitive data
security requirements
web services