International Journal of Soft Computing

Year: 2014
Volume: 9
Issue: 1
Page No. 1 - 9

Two Aspect Authentication System Using Secure Mobile Devices

Authors : E. Mohan, Ramanathan and S. Uvaraj

References

Brainard, J., A. Juels, R.L. Rivest, M. Szydlo and M. Yung, 2006. Fourth-Aspect Authentication: Somebody You Know. ACM CCS, pp: 168-178

Herzberg, A., 2003. Payments and banking with mobile personal devices. Commun. ACM, 46: 53-58.
CrossRef  |  

Josang, A. and G. Sanderud, 2003. Security in mobile communications: Challenges and opportunities. Proc. Aust. Inform. Secur. Workshop Conf. ACSW Frontiers, 21: 43-48.

Mallat, N., M. Rossi and V. Tuunainen, 2004. Mobile banking services. Commun. ACM, 47: 42-46.

Medrano, A., 2008. Online banking security-layers of protection. http://ezinearticles.com/?Online-Banking-Security---Layers-of-Protection&id=1353184.

Schneier, B., 2005. Two-Aspect Authentication: Too Little, Too Late. Commun. ACM, 48: 136-136.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved