An Authentication and Security Protocol for Mobile Computing.
Yuliang ZhengPublished in: IFIP World Conference on Mobile Communications (1996)
Keyphrases
- mobile computing
- security protocols
- authentication protocol
- security services
- security mechanisms
- mobile devices
- wireless networks
- context aware
- mobile users
- data management
- security requirements
- ubiquitous computing
- wireless communication
- data collection
- smart card
- distributed systems
- mobile agents
- key management
- computing environments
- rfid tags
- resource constrained
- security issues
- access control
- wireless sensor networks
- mobile learning
- security analysis
- databases
- mobile phone
- operating system
- ambient intelligence
- end to end
- artificial intelligence