Full metadata record
DC pole | Hodnota | Jazyk |
---|---|---|
dc.contributor.author | Dostálek, Libor | |
dc.contributor.author | Šafařík, Jiří | |
dc.contributor.editor | Pinker, Jiří | |
dc.date.accessioned | 2019-10-15T09:11:51Z | |
dc.date.available | 2019-10-15T09:11:51Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | 2017 International Conference on Applied Electronics: Pilsen, 5th – 6th September 2017, Czech Republic, p.49-54. | en |
dc.identifier.isbn | 978–80–261–0641–8 (Print) | |
dc.identifier.isbn | 978–80–261–0642–5 (Online) | |
dc.identifier.issn | 1803–7232 (Print) | |
dc.identifier.issn | 1805–9597 (Online) | |
dc.identifier.uri | http://hdl.handle.net/11025/35407 | |
dc.format | 6 s. | cs |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | en |
dc.publisher | Západočeská univerzita v Plzni | cs |
dc.rights | © Západočeská univerzita v Plzni | cs |
dc.subject | autentizace | cs |
dc.subject | AKA | cs |
dc.subject | mobilní aplikace | cs |
dc.subject | IMS | cs |
dc.subject | robustní dvoufaktorové ověřování | cs |
dc.subject | mobilní autentizace | cs |
dc.title | Strong password authentication with AKA authentication mechanism | en |
dc.type | konferenční příspěvek | cs |
dc.type | conferenceObject | en |
dc.rights.access | openAccess | en |
dc.type.version | publishedVersion | en |
dc.description.abstract-translated | This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the future. These applications will be based either on SIP (video on demand etc.) or HTTP-based protocols (e.g. as government applications or banking applications etc.). They will be provided not only by Telco operators, but also especially by independent third parties - application (content) providers (e.g. government, banks etc.). This contribution proposes new authentication algorithms that combine AKA algorithm with other authentication algorithms. Therefore, the authentication is not under the sole control of Telco operators, still using strong authentication AKA protocol. | en |
dc.subject.translated | authentication | en |
dc.subject.translated | AKA | en |
dc.subject.translated | mobile application | en |
dc.subject.translated | IMS | en |
dc.subject.translated | robust two-factor authentication | en |
dc.subject.translated | mobile authentication | en |
dc.type.status | Peer-reviewed | en |
Vyskytuje se v kolekcích: | Applied Electronics 2017 Applied Electronics 2017 |
Soubory připojené k záznamu:
Soubor | Popis | Velikost | Formát | |
---|---|---|---|---|
Dostalek.pdf | Plný text | 1,1 MB | Adobe PDF | Zobrazit/otevřít |
Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam:
http://hdl.handle.net/11025/35407
Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.