Keyphrases
- mobile devices
- mobile phone
- factor authentication
- mobile applications
- biometric authentication
- mobile environments
- fragile watermarking
- mobile users
- location aware
- computing environments
- identity authentication
- context aware
- mobile commerce
- mobile learning
- mobile networks
- security requirements
- mobile services
- security mechanisms
- mobile communication
- integrity verification