Book Title: Proceedings of The 2005 International Conference on Security and Management
Date: June 20, 2005
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two location-based user authentication mechanisms designed to take advantage of Bluetooth functionality built into many current handheld devices.
Type: InProceedings
Tags: authentication, bluetooth, mobile computing
Google Scholar: search
Attachments:
464.pdf | downloads: 1380 |