Cryptographic Security for Mobile Code.
Joy AlgesheimerChristian CachinJan CamenischGünter KarjothPublished in: IEEE Symposium on Security and Privacy (2001)
Keyphrases
- security protocols
- security properties
- key management
- smart card
- information security
- encryption scheme
- fuzzy vault
- cryptographic protocols
- mobile commerce
- security requirements
- mobile devices
- cryptographic algorithms
- encryption decryption
- encryption key
- access control
- security mechanisms
- high assurance
- mobile phone
- secure communication
- mobile payment
- mobile applications
- protection scheme
- security systems
- mobile computing
- mobile networks
- elliptic curve cryptography
- statistical databases
- random number generator
- stream cipher
- advanced encryption standard
- mobile learning
- network security
- security vulnerabilities
- public key cryptography
- intrusion detection
- sensitive data
- data security
- authentication protocol
- public key encryption
- context aware
- factor authentication
- encryption algorithms
- mobile internet
- security issues
- biometric data
- block cipher
- mobile services
- security level
- elliptic curve