2009
DOI: 10.1002/sec.113
|View full text |Cite
|
Sign up to set email alerts
|

Random security scheme selection for mobile transactions

Abstract: Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The video server transmits data from 6 s to 9 s using the primary channel in order to simulate the data of video streaming and will transmit through road-side unit 2 when car 1 and car 2 are in range of road-side unit 2. In this subsection, CEC mechanism combining CT of encoding and decoding FEC redundancy relies on the Reed-Solomon Code (Babu & Venkataram, 2009).…”
Section: Resultsmentioning
confidence: 99%
“…The video server transmits data from 6 s to 9 s using the primary channel in order to simulate the data of video streaming and will transmit through road-side unit 2 when car 1 and car 2 are in range of road-side unit 2. In this subsection, CEC mechanism combining CT of encoding and decoding FEC redundancy relies on the Reed-Solomon Code (Babu & Venkataram, 2009).…”
Section: Resultsmentioning
confidence: 99%