A secure message service using the secure domain of a mobile security solution.
GeonLyang KimYongSung JeonJeongNyeo KimPublished in: ICTC (2014)
Keyphrases
- security requirements
- security issues
- security services
- security measures
- security level
- security patterns
- previously mentioned
- security protocols
- security mechanisms
- security management
- key management
- data encryption
- information security
- sensitive data
- mobile agent system
- mobile payment
- user authentication
- data security
- key agreement protocol
- cryptographic protocols
- security architecture
- authentication scheme
- electronic voting
- stream cipher
- security analysis
- application level
- encryption scheme
- identity management
- security properties
- digital signature scheme
- mobile devices
- mobile rfid
- trusted computing
- authentication mechanism
- security model
- intrusion detection
- computing environments
- key distribution
- trusted third party
- public key encryption
- rfid systems
- web services
- integrity verification
- key establishment
- access control
- key exchange protocol
- mobile commerce
- private key
- secure communication
- key management scheme
- network security
- public key
- multi domain
- mobile phone
- wireless sensor networks