Security Analysis of Mobile Java.
Mourad DebbabiMohamed SalehChamseddine TalhiSami ZhiouaPublished in: DEXA Workshops (2005)
Keyphrases
- security analysis
- security requirements
- public key
- smart card
- security properties
- mobile devices
- security model
- mobile commerce
- high security
- authentication protocol
- image encryption
- open source
- encryption scheme
- lightweight
- databases
- object oriented
- user authentication
- authentication scheme
- mutual authentication
- source code
- web services
- access control
- low cost
- software engineering
- information systems