2016
DOI: 10.17485/ijst/2016/v9is1/106842
|View full text |Cite
|
Sign up to set email alerts
|

Passwordless Authentication in Mobile e-health using a Secure Boot Non-regenerated Unique Identity and NFC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…There are many different ways to verify the identity of a user. Here is a quick overview of some of the most common methods (Pandya, Narayan, Thakkar, Madhekar, & Thakare, 2015), (Kamarudin, Yussoff, & Hashim, 2016).…”
Section: Authentication Strategiesmentioning
confidence: 99%
“…There are many different ways to verify the identity of a user. Here is a quick overview of some of the most common methods (Pandya, Narayan, Thakkar, Madhekar, & Thakare, 2015), (Kamarudin, Yussoff, & Hashim, 2016).…”
Section: Authentication Strategiesmentioning
confidence: 99%
“…There are many different ways to verify the identity of a user. Here is a quick overview of some of the most common methods (Pandya, Narayan, Thakkar, Madhekar, & Thakare, 2015), (Kamarudin, Yussoff, & Hashim, 2016).…”
Section: Authentication Strategiesmentioning
confidence: 99%