HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2005 | Volume: 5 | Issue: 2 | Page No.: 215-219
DOI: 10.3923/jas.2005.215.219
Application of Cell-phonein Laptop Security
Rania Abdelhameed, Sabira Khatun , Borhanuddin Mohd Ali and Abdul Rahman Ramli

Abstract: Authentication is a mechanism help establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. In our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a short-range wireless link, in the concept of transient authentication. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

Fulltext PDF Fulltext HTML

How to cite this article
Rania Abdelhameed, Sabira Khatun , Borhanuddin Mohd Ali and Abdul Rahman Ramli, 2005. Application of Cell-phonein Laptop Security. Journal of Applied Sciences, 5: 215-219.

© Science Alert. All Rights Reserved