Mobile Identity Management

This paper reports on information security risks and best-practice in the area of Mobile Identity Management (Mobile IDM). It also provides recommendations of systems, protocols and/or approaches to address these challenges.

April 13, 2010
Maria Papadopouli, University of Crete & FORTH, Heraklion, Greece, André Årnes, Oracle Norway/ NISlab, Gjøvik University College, Norway,, Jorge Aguado Bombin, ISDEFE Madrid, Spain, Elisa Boschi, Hitachi Europe & ETH Zurich, Zurich, Switzerland,, Sonja Buchegger,Technische Universität, Berlin, Germany, Raul Benito Cortiñas, Isdefe, Madrid, Spain, Francesca Gaudino, Baker & McKenzie, Italy, Giles Hogben, ENISA, Heraklion, Greece, Thomas Karagiannis, Microsoft Research, Cambridge UK, Charalampos Manifavas, University of Crete, Heraklion, Katerina Mitrokotsa, Delft University of Technology, Nikos Nikiforakis, Katholik Universitat of Leuven, Belgium, Panos Papadimitratos, EPFL, Lausanne, Switzerland,, George Roussos, Birkbeck College, University of London, London, UK,, Katerina Tsakona, FORTH, Heraklion, Greece

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more