Towards authentication using mobile devices
暂无分享,去创建一个
In this paper we show how mobile devices can be used as authentication tokens. We highlight the prerequisites such as mobile device security and mobile communication security. We elaborate on already existing solutions and on what issues in the context of security remain to be addressed. Beside the comprehensive overview, our main contribution is to explain how the different characteristics of wireless communication can be abstracted. Based on this abstraction an implementation of mobile authentication is transparent both to the application programmer and to the end users.
[1] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[2] Pierangela Samarati,et al. Authentication, access control, and audit , 1996, CSUR.
[3] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[4] Uwe Hansmann,et al. Pervasive Computing Handbook , 2001, Springer Berlin Heidelberg.