2007 Second International Conference on Systems and Networks Communications (ICSNC 2007) 2007
DOI: 10.1109/icsnc.2007.82
|View full text |Cite
|
Sign up to set email alerts
|

Using the mobile phone as a security token for unified authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…However, the discussed work of [4] lacks potential benchmarking. Usage of mobile device was seen in the work of Hallsteinsen and Jorstad [5] for performing authentication. Certain studies [6] have also introduced Smart cards for security checks for user.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…However, the discussed work of [4] lacks potential benchmarking. Usage of mobile device was seen in the work of Hallsteinsen and Jorstad [5] for performing authentication. Certain studies [6] have also introduced Smart cards for security checks for user.…”
Section: Related Workmentioning
confidence: 98%
“…However, the study and its associated problems are more or less related to work done by [4] and [5]. Studies to overcome such similar approach by new and unique approach was found in the work carried out by Qing et al [11] who have proposed a new self-updating hash chain based linear partition-combination algorithm which can share data into m-parts and any part can't leak any information of data.…”
Section: Related Workmentioning
confidence: 98%
“…A One-Time-Password (OTP) MIDlet working on a mobile phone for integrated authentication designed for various types of internet services is presented in [39]. The proposed system minimizes the burden on users by automating the solution.…”
Section: A Review Of Otp Based Schemesmentioning
confidence: 99%
“…In terms of phone number privacy, with the popularity of mobile phones, a mobile phone number is used by more and more network systems as a means of binding users' identity [8]. User privacy stored in the system database, such as users' phone numbers, is often stolen by attackers who successfully invade the system database [9,10].…”
Section: Introductionmentioning
confidence: 99%