Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
SP'11 Proceedings of the 19th international conference on Security Protocols
Hi-index | 0.00 |
Current off-line electronic cash systems require a great number of complex online computations by clients during the payment phase. In this paper, we propose a new off-line anonymous cash scheme that greatly reduces the number of online computations ...