Secure End-To-End Authentication for Mobile Banking.
Basudeo SinghK. S. JasminePublished in: CSOC (2) (2015)
Keyphrases
- end to end
- factor authentication
- user authentication
- authentication mechanism
- authentication scheme
- authentication protocol
- security mechanisms
- key distribution
- data encryption
- security analysis
- integrity verification
- security requirements
- mobile devices
- ad hoc networks
- smart card
- mobile phone
- high bandwidth
- mobile terminals
- wireless ad hoc networks
- admission control
- key management
- congestion control
- multipath
- wifi
- service delivery
- content delivery
- real world
- security issues
- information security
- scalable video
- multimedia services
- mobile networks
- internet protocol
- mobile applications
- location aware
- response time
- computational complexity