Token Based Authentication Method Using Bluetooth Enabled Mobile Phone
Authentication is a mechanism to establish proof of identities; it ensures the right identification of a particular user or a particular system or device. Authentication is the first step in any cryptography solution, because unless the device knows who is using it, there is no point in encryptin...
| Main Author: | Abdel Hameed Mokhtar, Rania |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2004
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/6058/ http://psasir.upm.edu.my/id/eprint/6058/1/FK_2004_126.pdf |
Similar Items
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
Lecturer tracking system using bluetooth mobile phone / Syed Ridzuan Syed Nopal
by: Syed Nopal, Syed Ridzuan
Published: (2004)
by: Syed Nopal, Syed Ridzuan
Published: (2004)
Bluetooth-enabled ECG monitoring system
by: Kho, , T. K, et al.
Published: (2006)
by: Kho, , T. K, et al.
Published: (2006)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Consumers’ barriers towards Bluetooth-enabled advertising
by: Piret-Gerard, Julie
Published: (2012)
by: Piret-Gerard, Julie
Published: (2012)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005)
by: Che Khosni, Farahani
Published: (2005)
Token of courage
by: The Star
Published: (2013)
by: The Star
Published: (2013)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Electronic token system using RF technology
by: Thamayanthi, Thangavelu
Published: (2008)
by: Thamayanthi, Thangavelu
Published: (2008)
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
by: Khoo, Zong Zheng
Published: (2024)
by: Khoo, Zong Zheng
Published: (2024)
Mobile car alarm via bluetooth application
by: Norsyafiqah, Jamaluddin
Published: (2015)
by: Norsyafiqah, Jamaluddin
Published: (2015)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Smart door lock bluetooth using mobile android application
by: Abdul Muizz, Abdul Majid
Published: (2018)
by: Abdul Muizz, Abdul Majid
Published: (2018)
Staff outdoor positioning in large area campus using GPS enabled phone, Google Map and mobile network
by: Leow, Daniel Vee Leon, et al.
Published: (2011)
by: Leow, Daniel Vee Leon, et al.
Published: (2011)
Rangkaian gelang dengan laluan token
by: Mohd Saman, Md. Yazid
by: Mohd Saman, Md. Yazid
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Bluetooth transceivers for full duplex communications in mobile robots
by: Choo, S. H., et al.
Published: (2002)
by: Choo, S. H., et al.
Published: (2002)
Ghosts! A location-based Bluetooth LE mobile game for museum exploration
by: Nilsson, Tommy, et al.
Published: (2016)
by: Nilsson, Tommy, et al.
Published: (2016)
Design and development of automated token assembly system
by: Khaw, Jia Ying
Published: (2021)
by: Khaw, Jia Ying
Published: (2021)
Wireless controller area networking using token frame scheme
by: Ng, Wei Lun
Published: (2012)
by: Ng, Wei Lun
Published: (2012)
Using mobile phones in pub talk
by: Porcheron, Martin, et al.
Published: (2016)
by: Porcheron, Martin, et al.
Published: (2016)
Development of personal area network (PAN) for mobile robot using bluetooth transceiver
by: Choo, Sui Hong
Published: (2004)
by: Choo, Sui Hong
Published: (2004)
Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver
by: Choo, S. H, et al.
Published: (2003)
by: Choo, S. H, et al.
Published: (2003)
Effects of mobile phone usage behavior and mobile phone
addiction among youth
by: Munusamy, Kalaivani, et al.
Published: (2020)
by: Munusamy, Kalaivani, et al.
Published: (2020)
Mobile phone based pregnancy support system
by: Maniam, Jayanthy *, et al.
Published: (2007)
by: Maniam, Jayanthy *, et al.
Published: (2007)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
UMP launches alumni card as a token of gratitude
by: Mimi Rabita, Abdul Wahit
Published: (2020)
by: Mimi Rabita, Abdul Wahit
Published: (2020)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
Taxing Non-Resident Token Holders of Australian Land
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
Design of mobile phone jammer
by: Asuhaimi, Fauzan Abdullah, et al.
Published: (2011)
by: Asuhaimi, Fauzan Abdullah, et al.
Published: (2011)
The cultural connect: Mobile phone use and identity
by: Lloyd, Clare
Published: (2007)
by: Lloyd, Clare
Published: (2007)
Food Ordering System Using Mobile Phone
by: Leong, Wai Hong
Published: (2016)
by: Leong, Wai Hong
Published: (2016)
Home automation using bluetooth technology
by: Ahmad Thibraani, Termizi
Published: (2007)
by: Ahmad Thibraani, Termizi
Published: (2007)
Web-based course registration system using bluetooth technology
by: Mohamad Hazriman, Bin Husein
Published: (2006)
by: Mohamad Hazriman, Bin Husein
Published: (2006)
Smart door lock based on bluetooth and IoT
by: Hashim Al-Tuma, Khalid Asaad
Published: (2019)
by: Hashim Al-Tuma, Khalid Asaad
Published: (2019)
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
by: Tan, Choon Lin, et al.
Published: (2017)
by: Tan, Choon Lin, et al.
Published: (2017)
Similar Items
-
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014) -
Lecturer tracking system using bluetooth mobile phone / Syed Ridzuan Syed Nopal
by: Syed Nopal, Syed Ridzuan
Published: (2004) -
Bluetooth-enabled ECG monitoring system
by: Kho, , T. K, et al.
Published: (2006) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014) -
Consumers’ barriers towards Bluetooth-enabled advertising
by: Piret-Gerard, Julie
Published: (2012)