메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Entity authentication in a mobile-cloud environment

Author keywords

Fuzzy password; Mobile security; Picture authentication

Indexed keywords

DATA MODIFICATION; ENTITY AUTHENTICATIONS; FUZZY PASSWORD; MAN IN THE MIDDLES (MITM); MOBILE COMPUTING ENVIRONMENT; MOBILE SECURITY; POLITICAL SYSTEMS; PROTOCOL SECURITY;

EID: 84875970121     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2459976.2460024     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 84875993925 scopus 로고    scopus 로고
    • Bock, James T. (1996). Visual Authentication. http://websrv.cs.fsu.edu/ academics/grad/cnsa/projects/bock.pdf.
    • (1996) Visual Authentication
    • Bock, J.T.1
  • 7
    • 84875990408 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES). November 2001. Federal Information Processing Standards Publication 197
    • Advanced Encryption Standard (AES). November 2001. Federal Information Processing Standards Publication 197.
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R. L., Shamir A. and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM.
    • (1978) Communications of the ACM
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 0024012004 scopus 로고
    • The first ten years of public-key cryptography
    • May 1988
    • Diffie, W. The First Ten Years of Public-Key Cryptography. 1988. In Proceedings of the IEEE. Vol 76, 5. (May 1988).
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5
    • Diffie, W.1
  • 13
    • 84875979372 scopus 로고    scopus 로고
    • HP: Number of mobile apps doesn't matter
    • June 29
    • Erica Ogg, "HP: Number of mobile apps doesn't matter, " CNET News, June 29, 2011.
    • (2011) CNET News
    • Ogg, E.1
  • 15
    • 84875997262 scopus 로고    scopus 로고
    • URL, retrieved April, 2012
    • 2011 Mobile Threat Report, URL: https://www.mylookout.com/mobile-threat- report retrieved April, 2012.
    • 2011, Mobile Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.