2005 2nd International Symposium on Wireless Communication Systems
DOI: 10.1109/iswcs.2005.1547663
|View full text |Cite
|
Sign up to set email alerts
|

Strong Mobile Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…An enhancement implementation with PK-SIM card for strong mobile authentication was also proposed in [18]. In the article, the mobile user's private keys are stored in the memory of this tamper resistant card.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An enhancement implementation with PK-SIM card for strong mobile authentication was also proposed in [18]. In the article, the mobile user's private keys are stored in the memory of this tamper resistant card.…”
Section: Related Workmentioning
confidence: 99%
“…The public key algorithms in use today are computationintensive, and it may be too expensive or too slow for the mobile application for each message exchange. Furthermore, the fact that the solution, either in [17] or [18], uses J2ME as the programming platform, prevents its pervasion.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers consider this test set-up using a simply supported plate element as a simplified model to study the local buckling problem of the faces of sandwich panels (Hassinen, 2003). A similar compression test set-up was also used by Kech (1991) in his investigation to verify the improved equation developed for lightly profiled faces subject to local buckling and wrinkling effects.…”
Section: Test Set-up and Proceduresmentioning
confidence: 99%
“…Many mobile users have not been aware of the risks of mobile malware, and they may download Android application from third-party markets that can easily purvey malicious applications [32,31]. Even worse, attackers have already found out ways to evade detections [12]. Threats targeting smart phones and tablets are beginning to pose meaningful challenges to users, enterprises, and service providers alike.…”
Section: Introductionmentioning
confidence: 99%
“…However, it seems thatthe attackers have found ways to evade detections [12]. To make matters worse, there are other, third-party markets that are available for downloading Android applications that can easily purvey malicious applications [32,31].…”
Section: Introductionmentioning
confidence: 99%