Secure scheme for user authentication and authorization in android environment

Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on...

Full description

Bibliographic Details
Main Authors: Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi
Format: Article
Language:English
Published: IJERA 2013
Subjects:
Online Access:http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/1/humairadas.pdf