Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,391,230 papers from all fields of science
Search
Sign In
Create Free Account
Mobile identity management
Known as:
Mobile identity
Mobile identity is a development of online authentication and digital signatures, where the SIM card of one’s mobile phone works as an identity tool…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Authentication
Card reader
Certificate authority
Digital data
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Pattern of Success Vs. Pattern of Failure: Adaptive Authentication Through Kolmogorov–Smirnov (K-S) Statistics
G. Hossain
,
P. Palaniswamy
,
R. Challoo
2016
Corpus ID: 12979247
Smartphones have become a basic necessity in lives of all human beings. Apart from the core functionality of communication, these…
Expand
2015
2015
Mathematical Modelling of Trust Issues in Federated Identity Management
M. Ferdous
,
G. Norman
,
A. Jøsang
,
R. Poet
IFIP International Conference on Trust Management
2015
Corpus ID: 37218658
With the absence of physical evidence, the concept of trust plays a crucial role in the proliferation and popularisation of…
Expand
2013
2013
Dynamic Identity Federation Using Security Assertion Markup Language (SAML)
M. Ferdous
,
R. Poet
IFIP Conference on Policies and Research in…
2013
Corpus ID: 14397752
Security Assertion Markup Language (SAML, in short) is one of the most widely used technologies to enable Identity Federation…
Expand
2011
2011
Mobile Identity Management
J. Hoepman
Communications and Multimedia Security
2011
Corpus ID: 42127427
Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital…
Expand
2011
2011
Raw phones: the domestication of mobile phones amongst young adults in Hooggenoeg, Grahamstown
Alette Schoon
2011
Corpus ID: 169949299
2010
2010
A mobile identity authentication scheme of e-commerce based on Java-SIM card
Qiang Tang
,
Junwei Zou
,
C. Fan
,
Xiao-Ying Zhang
International Conference on Information…
2010
Corpus ID: 62645432
In order to protect the security of online transactions, e-commerce systems generally use PKI technology to meet the security…
Expand
2009
2009
The Digital Marauder's Map: A New Threat to Location Privacy
Xinwen Fu
,
Nan Zhang
,
Aniket Pingley
,
Wei Yu
,
Jie Wang
,
Wei Zhao
IEEE International Conference on Distributed…
2009
Corpus ID: 14006361
"The Marauder's Map" is a magical map in J. K. Rowling's fantasy series, "Harry Potter and the Prisoner of Azkaban". It shows all…
Expand
2008
2008
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings
S. F. Mjølsnes
,
S. Mauw
,
S. Katsikas
European Public Key Infrastructure Workshop
2008
Corpus ID: 36460504
2007
2007
Method for preventing illegal changing of mobile identity in mobile
박건우
,
신관민
,
예병석
,
황평주
2007
Corpus ID: 169553043
A portable terminal and an illegal device mobile identity change prevention method thereof are provided to prevent an illegal…
Expand
Review
2002
Review
2002
Mobile Identity Management
Uwe Jendricke
,
Michael Kreutzer
,
A. Zugenmaier
2002
Corpus ID: 8567068
In this paper we review the state-of-the-art in Mobile Identity Management and discuss its implications for the emerging…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE