Keyphrases
- mobile devices
- context aware
- security requirements
- information security
- security problems
- security issues
- network security
- intrusion detection
- access control
- mobile computing environment
- security vulnerabilities
- security systems
- key management
- security mechanisms
- security policies
- mobile computing
- network management
- remote server
- learning activities
- data security
- security measures
- mobile technologies
- elliptic curve
- operating system
- information assurance
- mobile phone
- web environment
- computer security
- functional requirements
- mobile networks
- database