How secure are networked office devices?
Edward CondonEmily CumminsZaïna AfoulkiMichel CukierPublished in: DSN (2011)
Keyphrases
- mobile devices
- microsoft office
- mobile agent system
- database systems
- office automation
- office environment
- authentication scheme
- user authentication
- security analysis
- key management
- lightweight
- multimedia
- security requirements
- multi party
- highly efficient
- embedded systems
- power consumption
- learning microsoft office
- covert channel