Personal Security Environment on Palm PDA

نویسندگان

  • Margus Freudenthal
  • Sven Heiberg
  • Jan Willemson
چکیده

Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all current digital signature applications. This paper describes the solution developed and prototyped by the authors – using a mobile computing device with a smart card reader for creating digital signatures. We give an overview of several common settings for digital signature applications and problems they have, describing also several frameworks for mobile security applications. A discussion about the choice of devices, design issues, concrete solutions and their security concerns follows. We conclude that although nothing can prevent careless private key handling, careful management is easier and more convenient when using our solu-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Palm PDA Computing

By creating a handheld computer that succeeded where so many other palm computers had failed, Palm Computing quickly gained popularity in the personal organizer market in 1996 and 1997. Today the Palm OS accounts for over 80% of all operating systems installed on handheld computers. In the addition, over the past several years, new open documentation standards, freely available Software Develop...

متن کامل

Elliptic Curve Cryptography on a Palm OS Device

The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing of eCommerce with mobile devices is the provision of security. We implemented elliptic curves over binary fields on a Palm OS device. We chose the NIST recommended random and Koblitz curves over GF (2) that are provid...

متن کامل

The Analysis of Graffiti Input and Its Application to Personal Identification

---------------------------------------------Abstract Recently, the mobile devices such as PDA and smart phones are widely used to organize personal data and to access the host systems from remote places. But, these devices are easily accessed by irregular users due to the stealge or the lost property. The authentification by password or the fingerprint can protect them, but the convenience of ...

متن کامل

A Design of local resource access control for mobile agent in PDA

Personal Device Assistance (PDA) devices are becoming popular, and some such devices have extended their capability to run a mobile agent platform. This paper describes a new security mechanism for mobile agent platforms running on PDAs. Our security mechanism is based on PDAgentSecurityManager built upon a Java virtual machine environment and provides dynamic authentication and flexible access...

متن کامل

Design and development of a prototype for an inexpensive multi-node mobile Palm-PDA-based wireless clinical information system platform

In this paper, we describe the design, development, and testing of an inexpensive wireless intelligent patient monitoring system. The system uses commercially-available wireless data acquisition links that operate on non-IEEE-802.x frequencies to reduce privacy and security concerns. It uses the more readily secured and robust wired Ethernet LAN to move data through the hospital to a PC-based E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000