End-to-end security mechanisms for SMS.
Jing-Shyang HwuShih-Feng HsuYi-Bing LinRong-Jaye ChenPublished in: Int. J. Secur. Networks (2006)
Keyphrases
- end to end
- security mechanisms
- resource constrained
- security issues
- access control
- smart card
- multipath
- mobile phone
- operating system
- security problems
- security requirements
- admission control
- congestion control
- security protocols
- scalable video
- service delivery
- rfid tags
- ad hoc networks
- application layer
- information systems
- transport layer
- resource constraints
- information security
- wireless sensor networks