By Topic

Security in mobile systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Subramanyam, V. ; Dept. of Comput. Eng. & Comput. Sci., Missouri Univ., Columbia, MO, USA ; Joshi, A.

Mobile computing has become popular over the last few years. Users need to have continuous access to information even when they are mobile, e.g., a doctor may need to constantly monitor a patient's health or a stock broker may need periodic information about the stock market, etc. Communication in such cases is typically over wireless links and it becomes critical to ensure secure message exchange. The traditional goals of secure computing have been to achieve confidentiality, integrity, availability, legitimacy and accountability. Messages exchanged between two hosts are usually coded by using symmetric or asymmetric ciphers, which makes it difficult for them to be seen by an outsider. This paper discusses issues concerned with mobility in a network and extensions of existing security schemes.

Published in:

Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on

Date of Conference:

20-23 Oct. 1998