Authentication : can mobile environments be secured?
MetadataShow full item record
A mobile system is defined as a network in which one or more of the interconnection links is a wireless medium. Wireless media include but are not limited to, cellular or radio transmissions, satellite services, and wireless computer networks. The fundamental operations of storage, processing, and transmission of information are undergoing such rapid improvement that the application of securing mobile systems cannot keep up with the rate of advance. This research analyzes security problems and investigates possible solutions that stem from the absence of a "fixed" link between the user and service provider in mobile systems. This research approaches all security issues from the authentication standpoint, i.e. the process of reliably verifying the identity of two parties in a communication channel. Once identities have been verified, the channel authenticity must be maintained. Mobile communication systems that utilize three systems, symmetric ciphers, public key systems, and zero-knowledge techniques, are shown to be highly secure. The level security is not degraded due to the absence of a "fixed" link between the user and service provider.
DescriptionDue to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to email@example.com, referencing the URI of the item.
Includes bibliographical references (leaves 29-32).
Cropper, Charles Austin (1999). Authentication : can mobile environments be secured?. Texas A&M University. Available electronically from