End-to-end security implementation for mobile devices using TLS protocol.
Baris KayayurtTugkan TuglularPublished in: J. Comput. Virol. (2006)
Keyphrases
- end to end
- mobile devices
- transport layer
- wifi
- internet protocol
- application layer
- network layer
- wireless ad hoc networks
- congestion control
- admission control
- security protocols
- high bandwidth
- mobile phone
- remote server
- ad hoc networks
- information security
- intrusion detection
- context aware
- transport protocol
- multipath
- mobile users
- physical layer
- access control