Identity authentication scheme of Android client based on identifiers
The Android mobile terminal’s own identifier information was used,which was credibly ensured by the Android system,then combining the Hash function and operation such as xor or connection,an algorithm of authentication information generation for the Android client was created.The traditional mobile...
Saved in:
Main Authors: | Ya-wei WANG, Chang-gen PENG, Hong-fa DING, Kai ZHOU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00140 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on Unified Identifier Authentication Service and Standards on Public Network
by: Hanlin Sun, et al.
Published: (2013-02-01) -
Scheme of node identify authentication in distributed file interaction system
by: Wen-cai HE, et al.
Published: (2013-08-01) -
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
Multi-server identity authentication scheme based on biometric and chaotic maps
by: Jianwu ZHANG, et al.
Published: (2017-02-01) -
Identity authentication scheme based on identity-based encryption
by: Ren-ji HUANG, et al.
Published: (2016-06-01)