Proxy-based security protocols in networked mobile devices.
Matt BurnsideDwaine E. ClarkeTodd MillsAndrew MaywahSrinivas DevadasRonald L. RivestPublished in: SAC (2002)
Keyphrases
- security protocols
- mobile devices
- embedded devices
- automated design
- mobile phone
- security services
- mobile learning
- cryptographic algorithms
- context aware
- security properties
- security mechanisms
- artificial immune algorithm
- key management
- authentication protocol
- multimedia
- cryptographic protocols
- secure communication
- security requirements
- rfid tags
- resource constrained
- operating system
- software engineering