Login / Signup
Extending Formal Analysis of Mobile Device Authentication.
William R. Claycomb
Dongwan Shin
Published in:
J. Internet Serv. Inf. Secur. (2011)
Keyphrases
</>
formal analysis
ban logic
mobile devices
context aware
formal methods
agent model
biometric authentication
learning activities
mobile applications
mobile learning
authentication protocol
user authentication
mobile users
smart phones
security requirements
location aware
knowledge acquisition
mobile phone