메뉴 건너뛰기




Volumn 8, Issue 1, 2009, Pages 59-74

A dynamic authentication scheme for mobile transactions

Author keywords

Authentication; Cognitiveagents; Mobile communication; Mobile transactions; Security

Indexed keywords

AUTHENTICATION SCHEME; BEHAVIOR ANALYSIS; COGNITIVEAGENTS; MOBILE COMMUNICATIONS; MOBILE TRANSACTION; PERFORMANCE ANALYSIS; SECURITY; USER BEHAVIORS;

EID: 54949140060     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (27)

References (39)
  • 5
    • 84875331501 scopus 로고    scopus 로고
    • Security of protocols against guessing attacks
    • M. Baudet, "Security of protocols against guessing attacks," SECSI '05, pp. 16-25, 2005.
    • (2005) SECSI '05 , pp. 16-25
    • Baudet, M.1
  • 6
    • 27544491391 scopus 로고    scopus 로고
    • VMSoar: a cognitive agent for network security
    • D. P. Benjamin, R. S. Iyer, and Archana Perumal, "VMSoar: a cognitive agent for network security," SPIE, vol. 5812, pp. 72-80, 2005.
    • (2005) SPIE , vol.5812 , pp. 72-80
    • Benjamin, D.P.1    Iyer, R.S.2    Perumal, A.3
  • 9
    • 0036749185 scopus 로고    scopus 로고
    • Behavior-based intrusion detection in mobile phone systems
    • A. Boukerche, and S. M. Mirela, "Behavior-based intrusion detection in mobile phone systems," Journal of Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.
    • (2002) Journal of Parallel and Distributed Computing , vol.62 , Issue.9 , pp. 1476-1490
    • Boukerche, A.1    Mirela, S.M.2
  • 17
    • 4143060331 scopus 로고
    • Mobile user location update and paging under delay constraints
    • J. Ho, and I. Akyildiz, "Mobile user location update and paging under delay constraints," Wireless Networks, vol. 1, no. 4, pp. 413-425, 1995.
    • (1995) Wireless Networks , vol.1 , Issue.4 , pp. 413-425
    • Ho, J.1    Akyildiz, I.2
  • 18
    • 84875355721 scopus 로고    scopus 로고
    • (http://sourceforge.net/projects/agentfactory)
  • 26
    • 34548157765 scopus 로고    scopus 로고
    • Ticket-based authentication and payment protocol for mobile telecommunications systems
    • B. Lee, T. Kim, and S. Kang, "Ticket-based authentication and payment protocol for mobile telecommunications systems," The International Symposium on Dependable Computing, pp. 218-221, 2001.
    • (2001) The International Symposium on Dependable Computing , pp. 218-221
    • Lee, B.1    Kim, T.2    Kang, S.3
  • 36
    • 0033683319 scopus 로고    scopus 로고
    • An architecture of F(22N) multiplier for elliptic curves cryptosystem
    • S. Sutikno, and A. Surya, "An architecture of F(22N) multiplier for elliptic curves cryptosystem," The IS- CAS 2000 on Circuits and Systems, vol. 1, pp. 196-206, 2000.
    • (2000) The IS-CAS 2000 on Circuits and Systems , vol.1 , pp. 196-206
    • Sutikno, S.1    Surya, A.2
  • 38
    • 84969531832 scopus 로고    scopus 로고
    • Transaction management for m-commerce at a mobile terminal, The 36th Annual Hawaii International Conference on System Sciences
    • J. Veijalainen, V. Terziyan, and H. Tirri, "Transaction management for m-commerce at a mobile terminal," The 36th Annual Hawaii International Conference on System Sciences, pp. 89.1, 2003.
    • (2003)
    • Veijalainen, J.1    Terziyan, V.2    Tirri, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.