: Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure.
Teddy MantoroAdmir MilisicMedia A. AyuPublished in: Int. J. Mob. Comput. Multim. Commun. (2011)
Keyphrases
- mobile phone
- smart card
- password authentication
- authentication scheme
- authentication protocol
- security analysis
- security mechanisms
- security requirements
- mobile technologies
- secure communication
- short message service
- mobile users
- fuzzy vault
- mobile devices
- information security
- smart phones
- mobile learning
- factor authentication
- secret key
- digital signature
- java card
- remote user authentication scheme
- user authentication
- mobile applications
- mobile phone users
- cost effective
- differential power analysis
- wifi
- public key
- information systems