Keyphrases
- security analysis
- smart card
- security requirements
- high security
- public key
- mobile devices
- security properties
- authentication protocol
- instant messaging
- mobile commerce
- encryption scheme
- mutual authentication
- image encryption
- user authentication
- access control policies
- communication technologies
- conflict resolution
- mobile users
- image quality