Online authentication using smart card technology in mobile phone infrastructure
The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be co...
| Main Authors: | Mantoro, Teddy, Milisic, Admir, Ayu, Media Anugerah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IGI Global
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf |
Similar Items
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Online payment procedure involving mobile phone network infrastructure and devices
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Blood vein detection system for SmartPhone
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
PC sound card based instrumentation and control
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Power supply interference in smart sensor microcontroller interface
by: Tijani, Ismaila, et al.
Published: (2011)
by: Tijani, Ismaila, et al.
Published: (2011)
An ingenious multiple communicator concept for next generation smart metering communication system
by: Hashim, Wahidah, et al.
Published: (2016)
by: Hashim, Wahidah, et al.
Published: (2016)
Power supply power-supply interference in smart sensors-to-microntroller interface for biomedical signals
by: Ashraful, Muhammad, et al.
Published: (2011)
by: Ashraful, Muhammad, et al.
Published: (2011)
Protein coding identification using modified gabor wavelet transform on multicore system
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
Online tutoring system in college: Case study in private education
by: Mohd Arif, Rafidah, et al.
Published: (2012)
by: Mohd Arif, Rafidah, et al.
Published: (2012)
A practical and interactive web-based software for online Qur’anic Arabic learning
by: Abdullah, Matin Saad, et al.
Published: (2017)
by: Abdullah, Matin Saad, et al.
Published: (2017)
Overview on fingerprinting authentication technology
by: Sulaiman, Nadzril, et al.
Published: (2020)
by: Sulaiman, Nadzril, et al.
Published: (2020)
Video streaming evaluation Of H.264 SVC on IEEE 802.11g wireless network
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Development of Quran reciter identification system using MFCC and GMM classifier
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Survey on language processing algorithm for sign language synthesizer
by: Maarif, Haris Al Qodri, et al.
Published: (2017)
by: Maarif, Haris Al Qodri, et al.
Published: (2017)
Low bit rate video coding for remote desktop operation of CNC milling
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Speech coding techniques and algorithms
by: A.Kassim, Liban, et al.
Published: (2011)
by: A.Kassim, Liban, et al.
Published: (2011)
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Scalable video coding : a review
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
JSVM reference software
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Fast mode decision algorithm
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
A novel multihoming-based flow mobility scheme to support mobility management in NEMO
by: Islam, Shayla, et al.
Published: (2014)
by: Islam, Shayla, et al.
Published: (2014)
Design and implementation of portable outdoor air quality measurement systemn using Arduino
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Introduction to multicast mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Miniaturized water flow and level monitoring system for
flood disaster early warning
by: Ifedapo Abdullahi, Salami, et al.
Published: (2017)
by: Ifedapo Abdullahi, Salami, et al.
Published: (2017)
Development of air quality measurement system using raspberry Pi
by: Mohd Pu'ad, Muhamad Farhan, et al.
Published: (2018)
by: Mohd Pu'ad, Muhamad Farhan, et al.
Published: (2018)
Signature recognition using artificial neural network
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
Classifications of multicast routing In mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Design of mobile phone jammer
by: Asuhaimi, Fauzan Abdullah, et al.
Published: (2011)
by: Asuhaimi, Fauzan Abdullah, et al.
Published: (2011)
Analysis of hybrid stepper motor performance under the influence of voltage supply interference
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A survey on video segmentation for real-time applications
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Bringing order in segments for a robust network in mobile services
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
Mobile drone localization in indoor environment based
on passive RFID
by: Habaebi, Mohamed Hadi, et al.
Published: (2020)
by: Habaebi, Mohamed Hadi, et al.
Published: (2020)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
A QoS awareness scheme sustaining seamless
handover for network mobility
by: Hussien, Loay Faisal, et al.
Published: (2014)
by: Hussien, Loay Faisal, et al.
Published: (2014)
Similar Items
-
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Online payment procedure involving mobile phone network infrastructure and devices
by: Mantoro, Teddy, et al.
Published: (2011) -
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010) -
Blood vein detection system for SmartPhone
by: Ahmed, Kazi Istiaque, et al.
Published: (2018) -
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)