Techniques for secure execution of mobile code: a review.
J.-M. Mas RibésBenoît MacqPublished in: Ann. des Télécommunications (2000)
Keyphrases
- code generation
- mobile devices
- mobile phone
- data flow
- source code
- java virtual machine
- key management
- mobile applications
- mobile environments
- heterogeneous platforms
- factor authentication
- security mechanisms
- mobile computing
- computing environments
- mobile learning
- context aware
- software development
- mobile networks
- security requirements
- smart phones
- mobile users
- control flow
- mobile commerce
- android application