메뉴 건너뛰기




Volumn , Issue , 2003, Pages 253-257

A personal authentication scheme using mobile technology

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; PERSONAL COMMUNICATION SYSTEMS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 84978900477     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITCC.2003.1197536     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 3
    • 84978904548 scopus 로고    scopus 로고
    • IEEE Std 802.15.1, Jun
    • IEEE Std 802.15.1, Jun. 2002. http://ieee802.org/15/pub/TG1.html.
    • (2002)
  • 7
    • 0034298976 scopus 로고    scopus 로고
    • Parasitic authentication to protect your E-wallet
    • Oct
    • T. Ebringer, P. Thorne, and Y. Zheng. Parasitic authentication to protect your E-wallet. Computer, 33(10):54-60, Oct. 2000.
    • (2000) Computer , vol.33 , Issue.10 , pp. 54-60
    • Ebringer, T.1    Thorne, P.2    Zheng, Y.3
  • 8
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Mar
    • K.M.; Mitchell C.J. Horn, G.; Martin. Authentication protocols for mobile network environment value-added services. IEEE Trans. on Vehicular Technology, 51(2):383-392, Mar. 2002.
    • (2002) IEEE Trans. on Vehicular Technology , vol.51 , Issue.2 , pp. 383-392
    • Mitchell, C.J.1    Horn, G.2    Martin, K.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.