A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices.
Alexander KlimmBenjamin GlasMatthias WachsSebastian VogelKlaus D. Müller-GlaserJürgen BeckerPublished in: Int. J. Reconfigurable Comput. (2011)
Keyphrases
- embedded devices
- mobile commerce
- mobile devices
- private key
- embedded systems
- security protocols
- public key
- security requirements
- mobile phone
- electronic commerce
- mobile users
- context aware
- data storage
- information security
- health monitoring systems
- mobile services
- mobile learning
- intrusion detection
- secret key
- limited memory
- signature scheme
- data structure
- databases