Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations
Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-Wesley Professional Computing Series)
Towards True Random Number Generation in Mobile Environments
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Secure storage and communication in J2ME based lightweight multi-agent systems
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Security'08 Proceedings of the 16th International conference on Security protocols
Hi-index | 4.10 |
An increasing number of smart phones support the Java 2 Platform, Micro Edition. Mobileapplication developers must deal with J2ME's inherent security weaknesses as well as bugs in implementations on real devices. Although it too has shortcomings, the new Security andTrust Services API for J2ME addresses some of these challenges.