Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Security requirements in service oriented architectures for ubiquitous computing
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Usability and privacy in identity management architectures
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
An investment content delivery secure e-service
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction for health, safety, mobility and complex environments - Volume Part II
Hi-index | 0.00 |
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network protocols, makes the design of security solutions particularly challenging. This paper discusses some of the difficulties system architects are faced with as well as some advantages mobile networks offer when designing security solutions for mobile communication.