Smart Card Authentication for Mobile Devices

نویسندگان

  • Wayne A. Jansen
  • Serban I. Gavrila
  • Clément Séveillac
چکیده

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Remote User Authentication Scheme with Anonymity for Mobile Devices

With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of re...

متن کامل

Smart Card based Mobile Payment Protocol

New mobile consumers are demanding access to a wider range of applications and services, convenient payment for digital content and physical goods, and integrated financial management services. As mobile devices evolve into ‘smart devices’, the primary requirements for realizing the digital contents providing services are to implement the compatibly secure payment protocol on m-commerce environ...

متن کامل

Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.

متن کامل

Mutual Authentication for Low-Power Mobile Devices

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes based on the discrete log gap problem.

متن کامل

A Personal Authentication Scheme Using Mobile Technology

Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005