Future Applications



In this last chapter, we present some application ideas that possibly allow existing secure communication applications to become more efficient, easier to use, and more resilient to cryptographic key related attacks. It would be our great pleasure if readers find more usages of dynamic secrets. Firstly, we propose to use dynamic secrets to secure business transactions for mobile users. Dynamic secrets may replace traditional usernames and passwords to form a strong and unique credential to prove the legitimate identity of users. Secondly, we expand the idea of dynamic secrets to the software copyright regime. The use of dynamic secrets can help the software maker distinguish a legitimate software copy installed on multiple computers and a pirate copy. Thirdly, we discusses the potential collaboration between dynamic secrets and energy efficient wireless communication schemes. The reduction on transmission power could be a positive factor for communication security because the eavesdropping adversary would have higher information loss rate.


Authentication Scheme Wireless Body Area Network Software Piracy Secrecy Capacity Digital Certificate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.College of Information ScienceHunan UniversityChangshaPeople’s Republic of China
  2. 2.Electrical and Computer EngineeringUniversity of Massachusetts AmherstAmherstUSA

Personalised recommendations