TOWARDS AUTHENTICATION USING MOBILE DEVICES An Investigation of the Prerequisites

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we show how mobile devices can be used as authentication tokens. We highlight the prerequisites such as mobile device security and mobile communication security. We elaborate on already existing solutions and on what issues in the context of security remain to be addressed. Beside the comprehensive overview, our main contribution is to explain how the different characteristics of wireless communication can be abstracted. Based on this abstraction an implementation of mobile authentication is transparent both to the application programmer and to the end users.

Author supplied keywords

Cite

CITATION STYLE

APA

Weippl, E., Essmayr, W., Gruber, F., Stockner, W., & Trenker, T. (2002). TOWARDS AUTHENTICATION USING MOBILE DEVICES An Investigation of the Prerequisites. In IFIP Advances in Information and Communication Technology (Vol. 100, pp. 91–105). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-0-387-35612-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free