Mobile User Authentication Scheme Based on Minesweeper Game.
Taejin KimSiwan KimHyunyi YiGunil MaJeong Hyun YiPublished in: MUE (2013)
Keyphrases
- authentication scheme
- mobile users
- smart card
- mobile phone
- secret key
- user authentication
- mobile devices
- mobile networks
- location dependent
- context aware
- mobile applications
- mobile computing
- mobile environments
- security flaws
- mobile agents
- public key
- security analysis
- information sources
- authentication protocol
- key management
- real time