Authentication, Authorization, and Protection for Mobile Computing Services
博士 === 國立交通大學 === 資訊工程系 === 87 === As the development of communication and computer technologies, a global mobile computing network is forming where people can access various communication services, including audio, video, image, and data, anytime and anywhere. Due to the globality and mobility of n...
Main Authors: | Chern-tang Lin, 林宸堂 |
---|---|
Other Authors: | Shiuh-Pyng Shieh |
Format: | Others |
Language: | zh-TW |
Published: |
1999
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15574715340405239675 |
Similar Items
-
Parameter based identification, authentication and authorization method for mobile services
by: Dasun Weerasinghe, P. W. H.
Published: (2010) -
Authentication and authorization in cloud computing using kerberos
by: Hidar, Ahmad M. Saeed
Published: (2014) -
Implementation of an Authentication/Authorization Server with Mobile IP and NAT
by: Wei-Huan Lee, et al.
Published: (2003) -
Authentication, access control and protection of mobile agents
by: Chu, Chin-Ju, et al.
Published: (1998) -
The Study of Secure and Privacy Protection Identity Authentication Mechanisms in Cloud Computing
by: Chun-Hung Lin, et al.
Published: (2014)