Authenticated mobile groups to secure the backhaul: A new paradigm and challenges.
Naïm QachriJean-Michel DricotPublished in: QSHINE (2014)
Keyphrases
- key exchange protocol
- key exchange
- authentication scheme
- key distribution
- key agreement protocol
- key issues
- mobile phone
- lessons learned
- mobile devices
- security issues
- mobile learning
- mobile computing
- password based authenticated key exchange
- wireless technologies
- m learning
- mobile technologies
- security requirements
- mobile users
- mobile applications
- diffie hellman
- mobile networks
- real world
- security analysis
- authentication protocol
- user authentication
- secure communication
- computing environments