An effective approach for authentication of mobile users.
Nawal A. El-FishawyMostafa A. NofalAlbert M. TadrosPublished in: VTC Spring (2002)
Keyphrases
- mobile users
- mobile phone
- mobile devices
- mobile computing
- context aware
- mobile environments
- mobile networks
- cellular networks
- base station
- location based services
- mobile commerce
- information sources
- mobile applications
- mobile services
- user mobility
- internet access
- mobile agents
- location dependent
- mobile technologies
- multimedia services
- security mechanisms
- location privacy
- data sets
- end to end
- privacy preserving
- computational intelligence
- multimedia