Two-phase authentication and encryption algorithm for mobile users.
Camelia AvramRadu MironDan RaduAdina AstileanPublished in: AQTR (2018)
Keyphrases
- mobile users
- encryption algorithm
- data encryption
- security analysis
- mobile phone
- high security
- mobile devices
- context aware
- encryption algorithms
- user authentication
- mobile applications
- security requirements
- information sources
- smart card
- authentication protocol
- public key
- encryption scheme
- digital content
- mobile agents
- authentication scheme
- database
- pseudorandom
- private key
- image encryption
- mobile commerce
- intelligent agents
- multimedia
- databases