Keyphrases
- mobile devices
- mobile commerce
- access control
- security issues
- information security
- mobile phone
- mobile computing environment
- mobile payment
- security policies
- mobile computing
- intrusion detection
- source code
- computer security
- network security
- statistical databases
- smart phones
- security level
- service management
- mobile environments
- mobile internet
- factor authentication
- key management
- security requirements
- context aware
- anomaly detection
- mobile applications
- mobile learning
- mobile services
- mobile agent system
- sql injection
- android application
- windows xp
- protection scheme
- electronic commerce
- wireless networks
- security threats
- mobile users
- security systems
- mobile networks
- security mechanisms