Login / Signup
Preventing delegation-based mobile authentications from man-in-the-middle attacks.
Jian-Zhu Lu
Jipeng Zhou
Published in:
Comput. Stand. Interfaces (2012)
Keyphrases
</>
countermeasures
mobile phone
mobile applications
mobile devices
access control
mobile learning
context aware
security protocols
conflict resolution
mobile environments
denial of service attacks
traffic analysis
security mechanisms
mobile computing
m learning
mobile users
mobile networks