Security in Mobile Computing: Attack Vectors, Solutions, and Challenges.
Sara AlwahediMariam Al AliFatimah Ishowo-OlokoWei Lee WoonZeyar AungPublished in: MONAMI (2016)
Keyphrases
- mobile computing
- mobile computing environment
- mobile devices
- wireless networks
- context aware
- data management
- ubiquitous computing
- mobile environments
- wireless communication
- low bandwidth
- mobile users
- transaction processing
- computing environments
- mobile agents
- location tracking
- access control
- data collection
- information security
- mobile platforms
- location dependent
- distributed systems
- intelligent systems
- mobile technologies
- computing paradigm
- database management systems
- database
- transaction model
- mobile applications
- social networks