Abstract

In current mobile systems, some applications already use public key techniques and an underlying Public Key Infrastructure (PKI) to provide security, and such use is widely expected to grow. This chapter provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The chapter also highlights the envisaged use of PKI in future mobile systems and the accompanying challenges it brings, drawing on recent results of the European Union's SHAMAN project.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call