Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Ryu WatanabeYuto NakanoToshiaki TanakaPublished in: Security and Management (2010)
Keyphrases
- mobile phone
- public key infrastructure
- authentication protocol
- public key
- factor authentication
- security mechanisms
- digital watermarking
- public key cryptography
- digital signature
- user authentication
- security analysis
- rfid systems
- mobile devices
- trusted third party
- security issues
- mobile applications
- smart card
- mobile learning
- mobile users
- resource constrained
- security protocols
- smart phones
- mobile technologies
- access control
- mobile phone users
- m learning
- key technologies
- security policies
- copyright protection
- provably secure
- authentication systems
- lightweight
- signature scheme
- text entry
- short message service