-
1
-
-
16244422691
-
Analysis of Payment Transaction Security in Mobile Commerce
-
Nambiar, S., Lu, C.-T., Liang, L.R.: Analysis of Payment Transaction Security in Mobile Commerce. In: IEEE International Conference on Information Reuse and Integration (IRI 2004), pp. 475-480 (2004)
-
(2004)
IEEE International Conference on Information Reuse and Integration (IRI
, pp. 475-480
-
-
Nambiar, S.1
Lu, C.-T.2
Liang, L.R.3
-
2
-
-
84949449782
-
Mobile Payments - State of the Art and Open Problems
-
Fiege, L, Mühl, G, Wilhelm, U.G, eds, WELCOM 2001, Springer, Heidelberg
-
Wrona, K., Schuba, M., Zavagli, G.: Mobile Payments - State of the Art and Open Problems. In: Fiege, L., Mühl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, pp. 88-100. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2232
, pp. 88-100
-
-
Wrona, K.1
Schuba, M.2
Zavagli, G.3
-
3
-
-
33746648087
-
An Open, PKI-Based Mobile Payment System
-
Müller, G, ed, ETRICS 2006, Springer, Heidelberg
-
Hassinen, M., Hyppönen, K., Haataja, K.: An Open, PKI-Based Mobile Payment System. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 86-100. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 86-100
-
-
Hassinen, M.1
Hyppönen, K.2
Haataja, K.3
-
4
-
-
33847092048
-
P2P-Paid: A Peer-to-Peer Wireless Payment System
-
Gao, J., Edunuru, K., Cai, J., Shim, S.: P2P-Paid: A Peer-to-Peer Wireless Payment System. In: Second IEEE International Workshop on Mobile Commerce and Services (WMCS'05), pp. 102-111 (2005)
-
(2005)
Second IEEE International Workshop on Mobile Commerce and Services (WMCS'05)
, pp. 102-111
-
-
Gao, J.1
Edunuru, K.2
Cai, J.3
Shim, S.4
-
5
-
-
0041291986
-
-
RFC3280
-
Housley, R., Polk, W., Ford, W., Solo, D.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Network Working Group (2002)
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF Network Working Group
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
6
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24, 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
7
-
-
33646418382
-
-
Lee, B.k., Lee, T.-C., Yang, S.H.: A MEP (Mobile Electronic Payment) and IntCA Protocol Design. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J.J. (eds.) HPCC 2005. LNCS, 3726, pp. 331-339. Springer, Heidelberg (2005)
-
Lee, B.k., Lee, T.-C., Yang, S.H.: A MEP (Mobile Electronic Payment) and IntCA Protocol Design. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J.J. (eds.) HPCC 2005. LNCS, vol. 3726, pp. 331-339. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
84867313902
-
Protecting the Computation Results of Free-Roaming Agents
-
Springer, LondonUK
-
Karjoth, G., Asokan, N., Gülcü, C.: Protecting the Computation Results of Free-Roaming Agents. In: Second International Workshop on Mobile Agents (MA'98), pp. 195-207. Springer, London(UK) (1998)
-
(1998)
Second International Workshop on Mobile Agents (MA'98)
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
9
-
-
37849023296
-
-
ITU -T. Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)
-
ITU -T. Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)
-
-
-
-
11
-
-
0036980311
-
Performance Analysis of Elliptic Curve Cryptography for SSL
-
Gupta, V., Gupta, S., Chang, S., Stebila, D.: Performance Analysis of Elliptic Curve Cryptography for SSL. In: 3rd ACM Workshop on Wireless Security, pp. 87-94 (2002)
-
(2002)
3rd ACM Workshop on Wireless Security
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
Stebila, D.4
-
12
-
-
35048846501
-
-
Tillich, S., Grobschädl, J.: A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. In: Aykanat, C., Dayar, T., Korpeoǧlu, İ;. (eds.) ISCIS 2004. LNCS, 3280, pp. 935-944. Springer, Heidelberg (2004)
-
Tillich, S., Grobschädl, J.: A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. In: Aykanat, C., Dayar, T., Korpeoǧlu, İ;. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 935-944. Springer, Heidelberg (2004)
-
-
-
-
13
-
-
37849016703
-
-
Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, Springer, Heidelberg (2000)
-
Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, Springer, Heidelberg (2000)
-
-
-
-
14
-
-
37849029312
-
-
Long, M., Wu, C.H.: An Intrusion-Resilient and Lightweight Authentication Method Based on Optimum Hash Chain for Wireless Networks (Accessed at: 23/02/2007) http://www.eng.auburn.edu/users/longmen/paper.html
-
Long, M., Wu, C.H.: An Intrusion-Resilient and Lightweight Authentication Method Based on Optimum Hash Chain for Wireless Networks (Accessed at: 23/02/2007) http://www.eng.auburn.edu/users/longmen/paper.html
-
-
-
-
15
-
-
18844403113
-
Performance Analysis of Cryptographic Protocols on Handheld Devices
-
Argyroudis, P.G., Verma, R., Tewari, H., O'Mahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: Third IEEE International Symposium on Network Computing and Applications (NCA'04), pp. 169-174 (2004)
-
(2004)
Third IEEE International Symposium on Network Computing and Applications (NCA'04)
, pp. 169-174
-
-
Argyroudis, P.G.1
Verma, R.2
Tewari, H.3
O'Mahony, D.4
|