Modifying authentication techniques in mobile communication systems.
Zakaria Zakaria HassanTalaat A. ElgarfAbdelhalim ZekryPublished in: CyberSec (2014)
Keyphrases
- communication systems
- communication technologies
- information processing systems
- blind equalization
- mobile devices
- computer systems
- factor authentication
- multiple access
- underwater acoustic
- wireless channels
- mobile phone
- biometric authentication
- mobile applications
- cognitive radio
- user authentication
- information systems
- mobile networks
- computing environments
- context aware
- machine learning
- security analysis
- digital watermarking
- mobile commerce
- databases
- mobile users
- response time
- web services
- data mining