A Personal Authentication Scheme Using Mobile Technology.
Jordi Herrera-JoancomartíJosep Prieto-BlázquezPublished in: ITCC (2003)
Keyphrases
- authentication scheme
- mobile technologies
- smart card
- mobile phone
- mobile devices
- mobile learning
- secret key
- language learning
- user authentication
- learning scenarios
- mobile applications
- security flaws
- public key
- learning activities
- mobile users
- m learning
- authentication protocol
- databases
- information and communication technologies
- context aware
- low cost
- web services
- learning algorithm