Performance evaluation on end-to-end security architecture for mobile banking system.
C. NarendiranS. Albert RabaraN. RajendranPublished in: Wireless Days (2008)
Keyphrases
- end to end
- security architecture
- access control
- security policies
- security model
- mobile devices
- simulation platform
- congestion control
- intrusion detection system
- ad hoc networks
- database
- mobile networks
- text localization and recognition
- data integrity
- security requirements
- data protection
- mobile computing
- security analysis
- security mechanisms
- mobile users
- network security
- distributed databases
- intrusion detection
- databases
- real time