Security in Mobile Communications: Challenges and Opportunities

The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network protocols, makes the design of security solutions particularly challenging. This paper discusses some of the difficulties system architects are faced with as well as some advantages mobile networks offer when designing security solutions for mobile communication.

[1]  Audun Jøsang,et al.  Authentication for Humans , 2001 .

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Wayne A. Jansen Guidelines on Active Content and Mobile Code | NIST , 2001 .

[4]  David Naccache,et al.  Cut and Paste Attacks with Java , 2002, IACR Cryptol. ePrint Arch..

[5]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[6]  Paul F. Syverson,et al.  Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.