全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Application of Cell-phonein Laptop Security

Keywords: Authenication , Mobile computing , bluetooth

Full-Text   Cite this paper   Add to My Lib

Abstract:

Authentication is a mechanism help establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. In our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a short-range wireless link, in the concept of transient authentication. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133