Login / Signup
Two factor authentication using mobile phones.
Fadi A. Aloul
Syed Zahidi
Wassim El-Hajj
Published in:
AICCSA (2009)
Keyphrases
</>
mobile phone
factor authentication
mobile devices
mobile terminals
mobile learning
smart card
mobile users
smart phones
mobile phone users
mobile applications
mobile technologies
small screen
computer simulation
network structure
trusted computing