Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Journal of Applied Sciences
  Year: 2005 | Volume: 5 | Issue: 2 | Page No.: 215-219
DOI: 10.3923/jas.2005.215.219
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Application of Cell-phonein Laptop Security

Rania Abdelhameed, Sabira Khatun , Borhanuddin Mohd Ali and Abdul Rahman Ramli

Abstract:
Authentication is a mechanism help establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. In our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a short-range wireless link, in the concept of transient authentication. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.
PDF Fulltext XML References Citation Report Citation
How to cite this article:

Rania Abdelhameed, Sabira Khatun , Borhanuddin Mohd Ali and Abdul Rahman Ramli , 2005. Application of Cell-phonein Laptop Security. Journal of Applied Sciences, 5: 215-219.

DOI: 10.3923/jas.2005.215.219

URL: https://scialert.net/abstract/?doi=jas.2005.215.219

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Curve Bottom