Using the mobile phone as a security token for unified authentication.
Steffen HallsteinsenIvar JørstadDo Van ThanhPublished in: ICSNC (2007)
Keyphrases
- mobile phone
- security mechanisms
- security requirements
- authentication mechanism
- identity authentication
- user authentication
- authentication protocol
- fuzzy vault
- data encryption
- integrity verification
- security analysis
- mobile devices
- factor authentication
- mobile users
- security issues
- smart card
- mobile learning
- security problems
- information security
- virtual private network
- security services
- access control
- intrusion detection
- biometric data
- cellular phone
- mobile phone users
- security policies
- mobile technologies
- key management
- mobile applications
- biometric authentication
- security protocols
- small screen
- smart phones
- biometric systems
- public key
- data security
- rfid tags
- cost effective