Authentication on mobile devices for business application.
Martina MüllerFabian ZollerIngo PansaAnsgar GerlicherPublished in: Open Identity Summit (2013)
Keyphrases
- business applications
- mobile devices
- data mining
- mobile phone
- business processes
- web services
- context aware
- mobile learning
- smart phones
- biometric authentication
- database applications
- embedded devices
- mobile environments
- mobile users
- web applications
- mobile technologies
- mobile computing
- computing devices
- mobile applications
- learning activities
- tablet computers
- image authentication
- web usage mining
- location based services
- security analysis
- location aware
- desktop computers
- authentication mechanism
- data sets
- factor authentication
- user authentication
- mobile commerce
- mobile terminals
- authentication protocol
- databases