journal6 ›› 2006, Vol. 27 ›› Issue (1): 47-50.

• Computer • Previous Articles     Next Articles

Programming of Transient Authentication for Mobile Devices

  

  1. (College of Mathematics and Computer Science,Hunan Normal University,Changsha 410081,China)
  • Online:2006-01-25 Published:2012-09-16

Abstract: Authentication for mobile networks is a key role in the security of information and devices.This paper presents the common techniques of mobile authentication firstly,and then analyses programming of transient authentication and token authentication mainly.In the end,a model of transient authentication and its application are introduced.

Key words: mobile device, transient authentication, security

WeChat e-book chaoxing Mobile QQ