Enhanced mobile security using SIM encryption.
Nader NassarRichard NewhookGrant MillerPublished in: CTS (2014)
Keyphrases
- encryption algorithms
- encryption scheme
- security properties
- encryption decryption
- key management
- identity authentication
- mobile commerce
- data encryption
- high security
- encryption algorithm
- security analysis
- security requirements
- key exchange
- virtual private network
- information security
- secret key
- integrity verification
- mobile phone
- elliptic curve cryptography
- mobile devices
- public key cryptography
- digital rights management
- data confidentiality
- mobile applications
- security policies
- stream cipher
- private key
- mutual authentication
- public key
- context aware
- mobile computing
- access control
- mobile payment
- network security
- mobile learning
- ad hoc networking
- mobile users
- image encryption
- data protection
- user authentication
- security protocols
- diffie hellman
- network management
- cryptographic protocols
- resource constrained
- ciphertext
- factor authentication
- information hiding
- digital signature