Adaptive security protocol selection for mobile computing.
Bruno P. S. RochaDaniel N. O. CostaRande A. MoreiraCristiano G. RezendeAntonio Alfredo Ferreira LoureiroAzzedine BoukerchePublished in: J. Netw. Comput. Appl. (2010)
Keyphrases
- mobile computing
- security protocols
- wireless networks
- mobile devices
- context aware
- data management
- mobile environments
- mobile users
- ubiquitous computing
- computing environments
- data collection
- mobile agents
- wireless communication
- distributed systems
- mobile computing environment
- mobile technologies
- transaction model
- mobile applications
- security mechanisms
- key management
- distributed databases
- mobile phone