Authenticating and securing mobile applications using microlog

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper elucidates the research and implementation of Microlog in J2ME applications. This small yet powerful logging library logs all the detailed background transactions, acts as a tool for detecting unauthorized users trying to access the application by logging to remote servers and devices via various logging destinations. It also retrieves useful runtime information, such as malfunction code and unexpected errors and behaviours. The log thus generated can be printed using a portable Bluetooth printer. J2ME being platform independent works with Microlog in providing a great feature being explored by future J2ME developers. © Springer-Verlag Berlin Heidelberg 2011.

Author supplied keywords

Cite

CITATION STYLE

APA

Gupta, S., & Singh, S. K. (2011). Authenticating and securing mobile applications using microlog. In Communications in Computer and Information Science (Vol. 133 CCIS, pp. 258–267). https://doi.org/10.1007/978-3-642-17881-8_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free