A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device.
Jong-Yeon ParkJung-Nyeo KimJae-Dock LimDong-Guk HanPublished in: ICITCS (2014)
Keyphrases
- mobile devices
- context aware
- information security
- security threats
- computer security
- location aware
- security mechanisms
- mobile phone
- security problems
- smart phones
- mobile learning
- web environment
- cyber attacks
- intrusion detection
- remote server
- cryptographic algorithms
- security issues
- security requirements
- network security
- security analysis
- security breaches