Full metadata record
DC pole | Hodnota | Jazyk |
---|---|---|
dc.contributor.author | Dostálek, Libor | |
dc.contributor.author | Ledvina, Jiří | |
dc.date.accessioned | 2019-09-23T10:46:31Z | - |
dc.date.available | 2019-09-23T10:46:31Z | - |
dc.date.issued | 2015 | |
dc.identifier.citation | 2015 International Conference on Applied Electronics: Pilsen, 8th – 9th September 2015, Czech Republic, p.23-26. | en |
dc.identifier.isbn | 978-80-261-0386-8 (Online) | |
dc.identifier.isbn | 978-80-261-0385-1 (Print) | |
dc.identifier.issn | 1805-9597 (Online) | |
dc.identifier.issn | 1803-7232 (Print) | |
dc.identifier.uri | http://hdl.handle.net/11025/35087 | |
dc.format | 4 s. | cs |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | en |
dc.publisher | Západočeská univerzita v Plzni | cs |
dc.rights | © University of West Bohemia | en |
dc.subject | autentizace | cs |
dc.subject | mobilní komunikace | cs |
dc.subject | mobilní telefony | cs |
dc.subject | Mobilní výpočetní technika | cs |
dc.subject | odpor | cs |
dc.subject | chytré karty | cs |
dc.title | Strong authentication for internet mobile application | en |
dc.type | konferenční příspěvek | cs |
dc.type | conferenceObject | en |
dc.rights.access | openAccess | en |
dc.type.version | publishedVersion | en |
dc.description.abstract-translated | 4G networks to utilize Voice over LTE (VoLTE). VoLTE uses similar authentication mechanisms such as HTTP. It is therefore possible that a web client on the mobile device will use for authentication mechanism originally designed for the VoLTE [10]. I.e. to use the AKA mechanism, which uses the UICC (USIM / ISIM). This mechanism authenticates the user to the mobile network. However, Web applications can provide another entity. This contribution to discuss the possibility of strong authentication into applications running on mobile devices. It deals with the possibility of combining algorithm AKA with other authentication algorithms. Combination of two algorithms will be created strong multifactor authentication, which is suitable for applications demanding high secure authentication such as Internet banking or Internet access to the Government applications. | en |
dc.subject.translated | authentication | en |
dc.subject.translated | mobile communication | en |
dc.subject.translated | Mobile handsets | en |
dc.subject.translated | Mobile computing | en |
dc.subject.translated | resistance | en |
dc.subject.translated | smart cards | en |
dc.type.status | Peer-reviewed | en |
Vyskytuje se v kolekcích: | Články / Articles (KAE) Applied Electronics 2015 Applied Electronics 2015 |
Soubory připojené k záznamu:
Soubor | Popis | Velikost | Formát | |
---|---|---|---|---|
Dobias_Stastny.pdf | Plný text | 307,24 kB | Adobe PDF | Zobrazit/otevřít |
Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam:
http://hdl.handle.net/11025/35087
Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.