I. Introduction
Security technologies are critical for building user confidence and facilitating broad market adoption of next-generation wireless e-business solutions. For example, while future mobile phones will play a pivotal role in electronic-business by delivering a range of services anywhere, and at any time, they are a possible target to attacks. Anyone could intercept virtually any cellular transmission or conversation. Imagine a situation where hackers can steal a phone user's billing data and make fraudulent calls. A more catastrophic threat exists when sensitive or private information (i.e., personal medical insurance applications or credit card, and social security numbers) is being relayed, and consequently eavesdropped, through a cellar phone. If there exists a constant paranoia of insecure communications, users will not be willing to use such technologies.