Abstract
Cellular data services have become popular in Japan. These services are based on the first generation security model for cellular phones. The model has server authentication, data encryption, application integrity check and user authentication. This paper discusses the security functions and evaluates the security features of an application on cellular phones. The evaluation shows that real usage is important to identify security related functions needed for wide range of users. We raise those issues in this paper. We also discuss the enhanced security model targeted for next generation cellular phones and describe topics for future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wu, G., Miura, R., Hase, Y.: A Broadband Wireless Access System Using Stratospheric Platforms, IEEE Globecom 2000, November 2000
Scholtz, R. A., Win, M. Z.: Impulse Radio, Invited Paper, IEEE PIMRC 1997, Helsinki
Crispin, M. R., “INTERNET MESSAGE ACCESS PROTOCOL-VERSION 4 rev1”, RFC 2060, December 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuroda, M., Yoshida, M., Sakurai, S., Munaka, T. (2002). Design of Secure Mobile Application on Cellular Phones. In: Chen, YC., Chang, LW., Hsu, CT. (eds) Advances in Multimedia Information Processing — PCM 2002. PCM 2002. Lecture Notes in Computer Science, vol 2532. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36228-2_3
Download citation
DOI: https://doi.org/10.1007/3-540-36228-2_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00262-8
Online ISBN: 978-3-540-36228-9
eBook Packages: Springer Book Archive