Location-Based Authentication and Authorization Using Smart Phones | IEEE Conference Publication | IEEE Xplore

Location-Based Authentication and Authorization Using Smart Phones


Abstract:

Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: wha...Show More

Abstract:

Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a location-based authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including three parts: location registration, authentication and authorization as well as location verification, are described.
Date of Conference: 25-27 June 2012
Date Added to IEEE Xplore: 06 September 2012
ISBN Information:

ISSN Information:

Conference Location: Liverpool, UK

Contact IEEE to Subscribe

References

References is not available for this document.