|
Volumn , Issue , 2002, Pages 265-272
|
Proxy-based security protocols in networked mobile devices
a a a a a a |
Author keywords
Authorization; Certificate; Certificate chain; Certificate chain discovery; Mobile device; Pervasive; Protocol; Proxy; Security; Ubiquitous; Wireless
|
Indexed keywords
COMPUTATIONAL METHODS;
DISTRIBUTED COMPUTER SYSTEMS;
MOBILE COMPUTING;
MOBILE TELECOMMUNICATION SYSTEMS;
NETWORK PROTOCOLS;
PUBLIC KEY CRYPTOGRAPHY;
SOFTWARE PROTOTYPING;
WIRELESS TELECOMMUNICATION SYSTEMS;
CERTIFICATE CHAIN DISCOVERY;
COMPUTATIONALLY INEXPENSIVE PROTOCOL;
DEVICE-TO-PROXY COMMUNICATION;
NETWORKED MOBILE DEVICES;
PROXY BASE SECURITY PROTOCOLS;
PROXY-TO-PROXY COMMUNICATION;
SIMPLE DISTRIBUTED SECURITY INFRASTRUCTURE;
SIMPLE PUBLIC KEY INFRASTRUCTURE;
SECURITY OF DATA;
|
EID: 0036041841
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/508832.508845 Document Type: Conference Paper |
Times cited : (44)
|
References (30)
|