Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,547,651 papers from all fields of science
Search
Sign In
Create Free Account
Mobile identity management
Known as:
Mobile identity
Mobile identity is a development of online authentication and digital signatures, where the SIM card of one’s mobile phone works as an identity tool…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Authentication
Card reader
Certificate authority
Digital data
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A National Mobile Identity Management Strategy for Electronic Government Services
Glaidson Menegazzo Verzeletti
,
E. R. D. Mello
,
Michelle S. Wangham
17th IEEE International Conference On Trust…
2018
Corpus ID: 52165712
The purpose of electronic government (e-Gov) programs is to promote government transparency and improve interactions with its…
Expand
2018
2018
A Speech and Lip Authentication System Based On Android Smart Phone
Xinman Zhang
,
Jiayu Zhang
,
Tingting He
,
L. Chen
,
Yuanjun Shen
,
Xuebin Xu
International Conference on Industrial Technology
2018
Corpus ID: 75139258
In the modern era of rapid development of information technology and mobile Internet, mobile terminals represented by Android…
Expand
2017
2017
Mobile Identity Construction by Male and Female Students in Pakistan: On, In, and Through the Phone
Bushra Hassan
,
T. Unwin
2017
Corpus ID: 56466765
This article reports on focus group research in Pakistan about the symbolic value and use of mobile phones by students in…
Expand
2014
2014
Research of eID Mobile Identity Authentication Method
Xu Wu
,
Yueke Fan
,
Xi Zhang
,
Jin Xu
International Standard Conference of Trustworthy…
2014
Corpus ID: 49416096
In the new era of big data, existing mobile identity authentication methods lack universal protection for user privacy, which…
Expand
2014
2014
Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management
M. Talamo
,
Selvakumar Ramachandran
,
M. Barchiesi
,
D. Merella
,
C. Schunck
Open Identity Summit
2014
Corpus ID: 4870106
The SSEDIC ("Scoping the Single European Digital Identity Community") thematic network has concluded an intensive 3-year…
Expand
2013
2013
Better User Protection with Mobile Identity
D. Thanh
,
T. Jønvik
,
I. Jørstad
,
Do van Thuan
International Conference on IT Convergence and…
2013
Corpus ID: 207500
So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant…
Expand
2010
2010
A mobile identity authentication scheme of e-commerce based on Java-SIM card
Qiang Tang
,
Junwei Zou
,
C. Fan
,
Xiao-Ying Zhang
International Conference on Information…
2010
Corpus ID: 62645432
In order to protect the security of online transactions, e-commerce systems generally use PKI technology to meet the security…
Expand
Review
2009
Review
2009
User-centric Mobile Identity Management Services 1
Tewfiq El Maliki
,
J. Seigneur
2009
Corpus ID: 16962524
Digital identity is the ground necessary to guarantee that the Internet infrastructure is strong enough to meet basic…
Expand
2008
2008
New authentication scheme for M-commerce based on two dimension bar code
Mu Yang
,
Runtong Zhang
,
Qin Wang
IEEE International Conference on Service…
2008
Corpus ID: 14252029
In this paper, the new OTP authentication scheme is based on two dimension bar code and can be adapted into M-commerce…
Expand
2007
2007
Method for preventing illegal changing of mobile identity in mobile
박건우
,
신관민
,
예병석
,
황평주
2007
Corpus ID: 169553043
A portable terminal and an illegal device mobile identity change prevention method thereof are provided to prevent an illegal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE