End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication.
Chin-Chen ChangKuo-Lun ChenMin-Shiang HwangPublished in: Wirel. Pers. Commun. (2004)
Keyphrases
- end to end
- end users
- mobile communications
- security protocols
- wifi
- security services
- security mechanisms
- ad hoc networks
- user interface
- key management
- mobile computing
- wireless networks
- distributed computing
- content providers
- security requirements
- service providers
- user experience
- ubiquitous computing
- multipath
- future trends
- access control
- resource constrained
- smart card
- context aware
- low cost
- artificial intelligence