ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
18
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,395
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Reverse Authentication in Financial Transactions and Identity Management
Author(s):
Bangdao Chen
,
Long Nguyen
,
A. W. Roscoe
,
Long Nguyen
,
A. W. ROSCOE
Publication date:
2013
Journal:
Mobile Netw Appl
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electronic Workshops in Computing (eWiC)
Author and article information
Journal
DOI::
10.1007/s11036-012-
ScienceOpen disciplines:
Applied computer science
,
Computer science
,
Security & Cryptology
,
Graphics & Multimedia design
,
General computer science
,
Human-computer-interaction
Data availability:
ScienceOpen disciplines:
Applied computer science
,
Computer science
,
Security & Cryptology
,
Graphics & Multimedia design
,
General computer science
,
Human-computer-interaction
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,395
Does financial efficiency modify CO2 emission? Using panel ARDL-PMG in the case of five selected ASEAN countries
Authors:
Nur Azwani Mohamad Azmin
,
Suhaily Maizan Abdul Manaf
,
Rosmaiza Abdul Ghani
…
Cooperative object detection in road traffic 1 1The research for this paper was financially supported by the Hollosi Ferenc Tudastamogato Alapitvany
Authors:
Olivér Törő
,
Tamas Becsi
,
Szilard Aradi
…
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
Authors:
Dan Wallach
,
Srinivas Devadas
,
Mehrdad Majzoobi
…
See all similar
Cited by
1
Secure Communication in Disasters
Authors:
Bangdao Chen
,
Ivan Flechais
,
Sadie Creese
…
See all cited by