mobile and pervasive computing

Efficient authentication for mobile and pervasive computing

FREE-DOWNLOAD [PDF] B Alomair… – Information and Communications Security, 2010
Abstract. With today’s technology, many applications rely on the existence of small devices that
can exchange information and form com- munication networks. In a significant portion of such
applications, the confidentiality and integrity of the communicated messages are of par-