메뉴 건너뛰기




Volumn 4, Issue 9, 2008, Pages 2305-2314

Secure authentication protocols for mobile commerce transactions

Author keywords

Authentication protocol; Communication privacy; Electronic transaction; Mobile commerce

Indexed keywords


EID: 63549129912     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (23)
  • 1
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Proc. of the Advances in Cryptology-EUROCRYPT'97, Springer, Berlin
    • R. Cramer, R. Gennaro and J. Borrell, A secure and optimally efficient multi-authority election scheme, Proc. of the Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, pp. 103-117, Springer, Berlin, 1997.
    • (1997) Lecture Notes in Computer Science , pp. 103-117
    • Cramer, R.1    Gennaro, R.2    Borrell, J.3
  • 2
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer-Verlag, pp, Santa Barbara, California, USA
    • R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proc. of the Advanced in Cryptology-Crypto'98, Springer-Verlag, pp. 13-25, Santa Barbara, California, USA, 1998.
    • (1998) Proc. of the Advanced in Cryptology-Crypto'98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 3
    • 1642635005 scopus 로고    scopus 로고
    • A security payment scheme of mobile e-commerce
    • Beijing, China
    • Y. Dai and L. Zhang, A security payment scheme of mobile e-commerce, Proc. of the ICCT2003, pp. 949-952, Beijing, China, 2003.
    • (2003) Proc. of the ICCT2003 , pp. 949-952
    • Dai, Y.1    Zhang, L.2
  • 4
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, vol. 29, no. 4, pp. 77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 5
    • 0141449410 scopus 로고    scopus 로고
    • Enabling e-commerce through PKI
    • J. Hughes, Enabling e-commerce through PKI, Network Security, pp. 14-16, 2000.
    • (2000) Network Security , pp. 14-16
    • Hughes, J.1
  • 7
    • 0036466678 scopus 로고    scopus 로고
    • Adding timestamps to the secure electronic auction protocol
    • M. S. Hwang, E. J. L. Lu and I. C. Lin, Adding timestamps to the secure electronic auction protocol, Data and Knowledge Engineering, vol. 40, no. 2, pp. 155-162, 2002.
    • (2002) Data and Knowledge Engineering , vol.40 , Issue.2 , pp. 155-162
    • Hwang, M.S.1    Lu, E.J.L.2    Lin, I.C.3
  • 9
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • G. K. Horn, M. Martin and C. J. Mitchell, Authentication protocols for mobile network environment value-added services, IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp. 383-392, 2002.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , Issue.2 , pp. 383-392
    • Horn, G.K.1    Martin, M.2    Mitchell, C.J.3
  • 12
    • 0037409816 scopus 로고    scopus 로고
    • Mobile communications: Evolution and impact on business operations
    • S. Kumar and C. Zahn, Mobile communications: Evolution and impact on business operations, Technovation, vol. 23, pp. 515-520, 2003.
    • (2003) Technovation , vol.23 , pp. 515-520
    • Kumar, S.1    Zahn, C.2
  • 14
    • 0141569860 scopus 로고    scopus 로고
    • Lightweight security for mobile commerce transactions
    • K. Y. Lam, S. L. Chung, M. Gu and J. G. Sun, Lightweight security for mobile commerce transactions, Computer Communications, vol. 26, pp. 2052-2060, 2003.
    • (2003) Computer Communications , vol.26 , pp. 2052-2060
    • Lam, K.Y.1    Chung, S.L.2    Gu, M.3    Sun, J.G.4
  • 15
    • 0033364756 scopus 로고    scopus 로고
    • Authentication protocol with nonrepudiation services in personal communication systems
    • H. Y. Lin and L. Harn, Authentication protocol with nonrepudiation services in personal communication systems, IEEE Communication Letters, vol. 3, pp. 236-238, 1999.
    • (1999) IEEE Communication Letters , vol.3 , pp. 236-238
    • Lin, H.Y.1    Harn, L.2
  • 16
    • 33846630288 scopus 로고    scopus 로고
    • Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
    • Y. Lee, J. Lee and J.S. Song, Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce, Computer Communications, vol. 30, no. 4, pp. 893-903, 2007.
    • (2007) Computer Communications , vol.30 , Issue.4 , pp. 893-903
    • Lee, Y.1    Lee, J.2    Song, J.S.3
  • 17
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • C. L. Lin, H. M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Communications Letters, vol. 5, no. 12, pp. 497-499, 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 18
    • 48249127045 scopus 로고    scopus 로고
    • Analysis of the robustness of the pressure-based individual identification system based on neural networks
    • L. Mi and F. Takeda, Analysis of the robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol. 3, no. 1, pp. 97-110, 2007.
    • (2007) International Journal of Innovative Computing, Information and Control , vol.3 , Issue.1 , pp. 97-110
    • Mi, L.1    Takeda, F.2
  • 20
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for global mobility network
    • S. Suzuki and K. Nakada, An authentication technique based on distributed security management for global mobility network, IEEE Journal on Selected Areas in Communications, vol. 15, no. 8, pp. 1608-1617, 1997.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakada, K.2
  • 21
    • 0035479950 scopus 로고    scopus 로고
    • Business models and transaction in mobile electronic commerce: Requirements and properties
    • A. Tsalgatidou and E. Pitoura, Business models and transaction in mobile electronic commerce: Requirements and properties, Computer Networks, vol. 37, pp. 221-236, 2001.
    • (2001) Computer Networks , vol.37 , pp. 221-236
    • Tsalgatidou, A.1    Pitoura, E.2
  • 22
    • 0036696328 scopus 로고    scopus 로고
    • Electronic payment systems: An analysis and comparison of types
    • H. C. Yu, K. H. Hsi and P. J. Kuo, Electronic payment systems: An analysis and comparison of types, Technology in Society, vol. 24, pp. 331-347, 2002.
    • (2002) Technology in Society , vol.24 , pp. 331-347
    • Yu, H.C.1    Hsi, K.H.2    Kuo, P.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.