Keynote Address: Mobile Computing versus Immobile Security.
Roger M. NeedhamPublished in: Security Protocols Workshop (2001)
Keyphrases
- mobile computing
- keynote address
- mobile computing environment
- wireless networks
- mobile devices
- context aware
- data management
- mobile users
- mobile agents
- ubiquitous computing
- united kingdom
- united states
- data collection
- computing environments
- transaction processing
- wireless communication
- distributed systems
- computer science education
- language technology
- mobile phone
- transaction model
- world class
- mobile technologies
- computing education
- user behavior
- double blind
- intelligent agents
- machine learning