{"title":"Design and implementation of mobile access system based on multi-factor authentication","authors":"Q. Hang, Hong Guo, Xiang Zou, Qiang Hou","doi":"10.1109/CSIP.2012.6308812","DOIUrl":null,"url":null,"abstract":"Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving IKE process to make the system more efficient.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computer Science and Information Processing (CSIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSIP.2012.6308812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving IKE process to make the system more efficient.