Wireless Public Key Infrastructure

Known as: WPKI 
Wireless Public Key Infrastructure (WPKI) is a two-factor authentication scheme using mainly the mobile phone and a laptop. It is mainly promoted by… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2013
02420002013

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Mobile devices play an important role in the wireless network environment for providing different services over internet. The… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2012
2012
The 3 Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE) / Long Term Evolution(LTE… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2011
2011
The 3rd Generation Partnership (3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE… (More)
  • figure 1
  • figure 2
Is this relevant?
2010
2010
The paper first analyzes security threats in the current network of e-commerce payment; and then based on the public key system… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2006
2006
Even though 3GPP presents a secure remote card application protocol through W-CDMA networks, it is unstable in terms of security… (More)
  • figure 1
  • figure 3
  • table I
  • figure 5
Is this relevant?
2003
2003
With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the… (More)
  • figure 4-1
  • figure 4-3
  • figure 4-5
  • figure 5-1
  • figure 5-2
Is this relevant?
2002
2002
Recent R/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2000
2000
We describe the design and implementation of public key infrastructure for the Bristol University Cyberjacket and three initial… (More)
  • figure 1
  • figure 2
Is this relevant?
2000
2000
 
Is this relevant?