Security Levels for Web Authentication Using Mobile Phones.
Anna VapenNahid ShahmehriPublished in: PrimeLife (2010)
Keyphrases
- mobile phone
- security requirements
- mobile internet
- mobile devices
- authentication mechanism
- fuzzy vault
- security mechanisms
- trust relationships
- smart phones
- data encryption
- user authentication
- integrity verification
- web applications
- mobile technologies
- factor authentication
- mobile users
- mobile learning
- security analysis
- m learning
- information sources
- authentication protocol
- information security
- biometric data
- security issues
- virtual private network
- smart card
- text entry
- mobile applications
- user experience
- user behavior
- end users