Social Authentication Protocol for Mobile Phones.
Bijan SoleymaniMuthucumaru MaheswaranPublished in: CSE (4) (2009)
Keyphrases
- mobile phone
- authentication protocol
- smart card
- mobile devices
- security analysis
- mobile users
- mobile phone users
- security protocols
- mobile learning
- smart phones
- public key
- user authentication
- lightweight
- social networks
- rfid tags
- secret key
- rfid systems
- social media
- mobile technologies
- social influence
- mobile applications
- data collection
- similarity measure