Now the rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The common Intrusion Detection System is not always sufficient and effective for wireless environment. Intrusio...
mobile computingmobile radioprotocolspublic key cryptographytelecommunication security/ WAP based mobile e-commerceWTLS securityWAP subprotocolanonymous client authentication schemeIn recent years, WAP has been gaining increasing popularity as a platform for mobile e-commerce; its security has thus become an...
Transaction security is commonly seen as one of the key factors influencing the success of Mobile Commerce. In this paper simulation-based performance measurements of the Wireless Transport Layer Security (WTLS) protocol are presented. Its impact on an exemplary m-commerce transaction is discussed.会议...
Zheng, W.: An Authentication and Security Protocol for Mobile Computing. In: Proceeding of IFIP, September 1996, pp. 249–257 (1996) Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: SCIS 2001 (January 2001) About this Chapter Title Security Enhance...
Rongtao, "WBIPS: a lightweight WTLS-based intrusion prevention scheme," in Pro- ceedings of the International Conference on Wireless Commu- nications, Networking and Mobile Computing, pp. 2298-2301, IEEE Press, September 2007.Dong L., Yu S., Xia T., Liao R. (2007), "WBIPS: A ...