Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security.
Florina AlmenárezDaniel Díaz SánchezAndrés Marín LópezPublished in: TrustBus (2004)
Keyphrases
- security requirements
- security issues
- security level
- security measures
- security mechanisms
- key management
- security management
- data encryption
- security analysis
- information security
- security protocols
- sensitive data
- data security
- security properties
- security architecture
- stream cipher
- electronic voting
- security services
- security model
- authentication mechanism
- key exchange protocol
- access control
- authentication protocol
- smart card
- key agreement protocol
- diffie hellman
- public key encryption
- previously mentioned
- integrity verification
- key agreement
- security patterns
- security policies
- secure communication
- user authentication
- mobile agent system
- key distribution
- rfid systems
- public key cryptosystem
- high security
- key exchange
- cryptographic protocols
- encryption scheme
- covert channel
- intrusion detection
- unauthorized access
- authentication scheme
- digital signature scheme
- secure multiparty computation
- network security
- public key
- secure routing
- key management scheme
- identity management
- secret key
- countermeasures
- digital rights management
- privacy preserving
- intrusion detection system
- single point of failure
- provably secure
- key establishment
- wireless sensor networks
- signature scheme
- public key infrastructure
- mutual authentication