Secure scheme for user authentication and authorization in android environment
Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on...
Main Authors: | Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi |
---|---|
Format: | Article |
Language: | English |
Published: |
IJERA
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/32551/ http://irep.iium.edu.my/32551/ http://irep.iium.edu.my/32551/1/humairadas.pdf |
Similar Items
-
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013) -
Integrating ZigBee modem into android platform
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014) -
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014) -
Development of an enhanced scheme for NEMO environment
by: Geaiger, Mohamed, et al.
Published: (2014) -
Android-based P2P file sharing over zigBee radios
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)