An authentication system using smart phones as secure storage.
Katsuyuki UmezawaSatoru TezukaShigeichi HirasawaPublished in: SMC (2011)
Keyphrases
- smart phones
- authentication mechanism
- mobile devices
- user authentication
- storage devices
- authentication protocol
- mobile phone
- authentication scheme
- identity management
- password authentication
- security mechanisms
- factor authentication
- data encryption
- security analysis
- integrity verification
- mobile applications
- secure manner
- key distribution
- security requirements
- touch screen
- processing power
- mobile platform
- wifi
- handheld devices
- private key
- security services
- smart devices
- secure communication
- smart card
- processing capabilities
- mobile platforms
- access control
- electronic payment
- security issues
- android platform
- file system
- tablet computers
- public key cryptography
- key agreement
- key agreement protocol
- information security
- security level
- data storage
- diffie hellman
- security protocols
- rights management