Mobile Identity Management

This paper reports on information security risks and best-practice in the area of Mobile Identity Management (Mobile IDM). It also provides recommendations of systems, protocols and/or approaches to address these challenges.

Published
April 13, 2010
Authors
Maria Papadopouli, University of Crete & FORTH, Heraklion, Greece, André Årnes, Oracle Norway/ NISlab, Gjøvik University College, Norway,, Jorge Aguado Bombin, ISDEFE Madrid, Spain, Elisa Boschi, Hitachi Europe & ETH Zurich, Zurich, Switzerland,, Sonja Buchegger,Technische Universität, Berlin, Germany, Raul Benito Cortiñas, Isdefe, Madrid, Spain, Francesca Gaudino, Baker & McKenzie, Italy, Giles Hogben, ENISA, Heraklion, Greece, Thomas Karagiannis, Microsoft Research, Cambridge UK, Charalampos Manifavas, University of Crete, Heraklion, Katerina Mitrokotsa, Delft University of Technology, Nikos Nikiforakis, Katholik Universitat of Leuven, Belgium, Panos Papadimitratos, EPFL, Lausanne, Switzerland,, George Roussos, Birkbeck College, University of London, London, UK,, Katerina Tsakona, FORTH, Heraklion, Greece
Language
English

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information