Strong authentication with mobile phone as security token.
Do Van ThanhIvar JørstadTore E. JønvikDo van ThuanPublished in: MASS (2009)
Keyphrases
- mobile phone
- security mechanisms
- security requirements
- identity authentication
- authentication mechanism
- authentication protocol
- data encryption
- security analysis
- integrity verification
- user authentication
- fuzzy vault
- mobile devices
- factor authentication
- security issues
- virtual private network
- security services
- biometric data
- security problems
- access control
- information security
- mobile applications
- mobile users
- mobile learning
- mobile phone users
- smart card
- biometric authentication
- mobile technologies
- smart phones
- security protocols
- intrusion detection
- encryption scheme
- cellular phone
- security policies
- qr code
- rfid reader
- data security
- biometric systems
- public key