Key Distribution and Management for Mobile Applications

Key Distribution and Management for Mobile Applications

György Kálmán, Josef Noll
Copyright: © 2008 |Pages: 13
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch011
Cite Chapter Cite Chapter

MLA

Kálmán, György, and Josef Noll. "Key Distribution and Management for Mobile Applications." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 145-157. https://doi.org/10.4018/978-1-59904-899-4.ch011

APA

Kálmán, G. & Noll, J. (2008). Key Distribution and Management for Mobile Applications. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 145-157). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch011

Chicago

Kálmán, György, and Josef Noll. "Key Distribution and Management for Mobile Applications." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 145-157. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch011

Export Reference

Mendeley
Favorite

Abstract

This chapter deals with challenges raised by securing transport, service access, user privacy, and accounting in wireless environments. Key generation, delivery, and revocation possibilities are discussed and recent solutions are shown. Special focus is on efficiency and adaptation to the mobile environment. Device domains in personal area networks and home networks are introduced to provide personal digital rights management (DRM) solutions. The value of smart cards and other security tokens are shown and a secure and convenient transmission method is recommended based on the mobile phone and near-field communication technology.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.