Secure Mobile Identities.
Varun ChandrasekaranFareeha AmjadAshlesh SharmaLakshminarayanan SubramanianPublished in: CoRR (2016)
Keyphrases
- mobile devices
- mobile phone
- mobile learning
- mobile applications
- lightweight
- mobile users
- factor authentication
- standard model
- mobile environments
- key management
- intelligent mobile
- security analysis
- security issues
- smart phones
- location aware
- mobile services
- security protocols
- mobile networks
- mobile terminals
- behavioral patterns
- user authentication
- authentication scheme
- mobile payment
- data encryption
- mobile rfid
- mobile technologies
- heterogeneous platforms