Login / Signup

Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone.

Noriyasu YamamotoToshihiko Wakahara
Published in: Int. J. Distributed Syst. Technol. (2012)
Keyphrases
  • cellular phone
  • mobile terminals
  • cellular phones
  • traffic signs
  • end users
  • mobile phone
  • real time
  • high level
  • data management
  • multimedia data
  • trusted computing