Online authentication using smart card technology in mobile phone infrastructure

The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be co...

Full description

Bibliographic Details
Main Authors: Mantoro, Teddy, Milisic, Admir, Ayu, Media Anugerah
Format: Article
Language:English
Published: IGI Global 2011
Subjects:
Online Access:http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf
id iium-6237
recordtype eprints
spelling iium-62372012-01-09T00:27:45Z http://irep.iium.edu.my/6237/ Online authentication using smart card technology in mobile phone infrastructure Mantoro, Teddy Milisic, Admir Ayu, Media Anugerah T Technology (General) TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability. IGI Global 2011-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf Mantoro, Teddy and Milisic, Admir and Ayu, Media Anugerah (2011) Online authentication using smart card technology in mobile phone infrastructure. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 3 (4). pp. 67-83. ISSN 1937-9412 http://www.igi-global.com/article/online-authentication-using-smart-card/58906 DOI: 10.4018/jmcmc.2011100105
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T Technology (General)
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle T Technology (General)
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Mantoro, Teddy
Milisic, Admir
Ayu, Media Anugerah
Online authentication using smart card technology in mobile phone infrastructure
description The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.
format Article
author Mantoro, Teddy
Milisic, Admir
Ayu, Media Anugerah
author_facet Mantoro, Teddy
Milisic, Admir
Ayu, Media Anugerah
author_sort Mantoro, Teddy
title Online authentication using smart card technology in mobile phone infrastructure
title_short Online authentication using smart card technology in mobile phone infrastructure
title_full Online authentication using smart card technology in mobile phone infrastructure
title_fullStr Online authentication using smart card technology in mobile phone infrastructure
title_full_unstemmed Online authentication using smart card technology in mobile phone infrastructure
title_sort online authentication using smart card technology in mobile phone infrastructure
publisher IGI Global
publishDate 2011
url http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/
http://irep.iium.edu.my/6237/1/Online_Authentication_Using_Smart_Card_Technology_in_Mobile_Phone_Infrastructure.pdf
first_indexed 2023-09-18T20:15:06Z
last_indexed 2023-09-18T20:15:06Z
_version_ 1777407734997581824