Back to Results
First PageMeta Content
Computing / Internet protocols / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / Wireless security / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Secure communication


Security Issues in Mobile Computing Srikanth Pullela Department of Computer Science
Add to Reading List

Document Date: 2002-11-04 12:10:11


Open Document

File Size: 290,29 KB

Share Result on Facebook

Company

Sun Microsystems / Sun.Net / /

/

Event

FDA Phase / /

Facility

Computer Science University of Texas / /

IndustryTerm

wireless channel / abbreviated handshake protocol / authentication protocol / security protocol / fixed wired network / wireless medium / Wireless Transport Layer Security protocol / authentication services using symmetric-key algorithm / wireless mobile communication environment / insecure public networks / public-key algorithms / wireless mobile communication technology / cryptographic protocols / Wireless Application Protocol / low bandwidth wireless channel / wireless communication takes / Internet WAP Proxy WAP Server / mobile devices / wireless environment / handshake protocol / ubiquitous infrastructure / communication networks / wireless security / authentication protocols / security protocols / few authentication protocols / /

Organization

University of Texas at Arlington / Computer Science University / Mobile Computing Srikanth Pullela Department / /

Product

J2ME / Java2 / Figure5 / /

ProgrammingLanguage

Java / /

ProvinceOrState

Texas / /

Technology

home network / authentication protocol / symmetric-key encryption / API / RSA encryption / abbreviated handshake protocol / smart card / mobile phones / security protocols / private key / two protocols / secret key / authentication services using symmetric-key algorithm / SSL / Alert protocols / mobile devices / 3.4 KSSL Security Protocol / encryption / cryptography / WAP / WAP protocol / few authentication protocols / security protocol / proposed protocols / 3.2 Protocols / wireless mobile communication technology / public key / Java / authentication protocols / layered protocol / SSL protocol / Wireless Transport Layer Security protocol / Mobile Computing / 2.2 Encryption / public-key algorithms / 3.3 Protocols / KSSL protocol / digital signature / cryptographic protocols / handshake protocol / 2.1 Encryption / be accessed using J2ME Connector API / /

SocialTag