Guest Editorial: Security in Mobile Computing Environments Jari VeijalainenAri Visa Editorial Introduction Pages: 111 - 112
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing Jeffrey UndercofferFilip PerichAnupam Joshi OriginalPaper Pages: 113 - 125
Supporting Fair Exchange in Mobile Environments Holger VogtFelix C. GärtnerHenning Pagnia OriginalPaper Pages: 127 - 136
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware John ZacharyRichard Brooks OriginalPaper Pages: 137 - 143
Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration Constantinos F. GrecasSotirios I. ManiatisIakovos S. Venieris OriginalPaper Pages: 145 - 150
Personal Trusted Devices for Web Services: Revisiting Multilevel Security Edgar WeipplWolfgang Essmayr OriginalPaper Pages: 151 - 157
Distributed PIN Verification Scheme for Improving Security of Mobile Devices Jian TangVagan TerziyanJari Veijalainen OriginalPaper Pages: 159 - 175
Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study Ramesh KarriPiyush Mishra OriginalPaper Pages: 177 - 185