Enterprise Security Requirements
Lightweight Mobile Cryptography Toolkits
Bouncy Castle Lightweight API
The IAIK ME JCE
Phaos Technology Micro Foundation Toolkit
NTRU jNeo for Java Toolkit
Standardization of J2ME Security APIs
This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today’s Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security ...