Protocols with Security Proofs for Mobile Applications.
Yiu Shing Terry TinHarikrishna VasantaColin BoydJuan Manuel González NietoPublished in: ACISP (2004)
Keyphrases
- mobile applications
- security protocols
- mobile devices
- cryptographic protocols
- security properties
- key agreement protocol
- authentication protocol
- context aware
- m learning
- user experience
- mobile phone
- mobile users
- information security
- mobile environments
- communication protocols
- smart phones
- mobile platform
- mobile services
- security services
- mobile platforms
- key distribution
- security requirements
- wifi
- location based services
- access control
- end users
- battery life
- messages exchanged
- security analysis
- key management
- mobile technologies
- desktop computers
- mobile apps
- encryption scheme