Online authentication using smart card technology in mobile phone infrastructure
The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be co...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IGI Global
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf |
id |
iium-6237 |
---|---|
recordtype |
eprints |
spelling |
iium-62372012-01-09T00:27:45Z http://irep.iium.edu.my/6237/ Online authentication using smart card technology in mobile phone infrastructure Mantoro, Teddy Milisic, Admir Ayu, Media Anugerah T Technology (General) TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability. IGI Global 2011-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf Mantoro, Teddy and Milisic, Admir and Ayu, Media Anugerah (2011) Online authentication using smart card technology in mobile phone infrastructure. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 3 (4). pp. 67-83. ISSN 1937-9412 http://www.igi-global.com/article/online-authentication-using-smart-card/58906 DOI: 10.4018/jmcmc.2011100105 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
T Technology (General) TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Mantoro, Teddy Milisic, Admir Ayu, Media Anugerah Online authentication using smart card technology in mobile phone infrastructure |
description |
The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability. |
format |
Article |
author |
Mantoro, Teddy Milisic, Admir Ayu, Media Anugerah |
author_facet |
Mantoro, Teddy Milisic, Admir Ayu, Media Anugerah |
author_sort |
Mantoro, Teddy |
title |
Online authentication using smart card technology in mobile phone infrastructure |
title_short |
Online authentication using smart card technology in mobile phone infrastructure |
title_full |
Online authentication using smart card technology in mobile phone infrastructure |
title_fullStr |
Online authentication using smart card technology in mobile phone infrastructure |
title_full_unstemmed |
Online authentication using smart card technology in mobile phone infrastructure |
title_sort |
online authentication using smart card technology in mobile phone infrastructure |
publisher |
IGI Global |
publishDate |
2011 |
url |
http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/ http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf |
first_indexed |
2023-09-18T20:15:06Z |
last_indexed |
2023-09-18T20:15:06Z |
_version_ |
1777407734997581824 |