Secure voice communication service based on security platform for mobile devices.
GeonLyang KimJeongNyeo KimPublished in: ICTC (2017)
Keyphrases
- mobile devices
- security services
- security mechanisms
- security requirements
- security issues
- secure communication
- resource constrained
- key management
- security protocols
- security level
- security measures
- mobile applications
- service management
- computing devices
- mobile services
- communication technologies
- security properties
- application level
- security analysis
- mobile environments
- single point of failure
- group communication
- security management
- communication protocol
- service platform
- mobile phone
- information security
- mobile commerce
- integrity verification
- data encryption
- sensitive data
- remote server
- wireless sensor
- short message service
- trusted computing
- cloud services
- cryptographic protocols
- computing environments
- diffie hellman
- smart card
- authentication protocol
- security model
- software as a service
- context aware
- short messages
- multi party
- service providers
- private key
- key agreement protocol
- cloud computing
- physical location
- mobile learning
- encryption scheme
- network management
- communication protocols
- communication networks
- key distribution
- mobile computing
- mobile users
- security policies
- computing platform
- user authentication
- access control
- smart phones
- secret key
- sensor networks
- trusted third party
- wireless sensor networks
- private cloud
- wifi
- ubiquitous computing
- information sharing
- rfid systems
- location based services
- messages exchanged
- elliptic curve
- standard model
- web services