-
1
-
-
84926055211
-
Market insight: The outlook on mobile payment
-
May
-
Gartner, "Market Insight: The Outlook on Mobile Payment," Market Analysis and Statistics, May 2010.
-
(2010)
Market Analysis and Statistics
-
-
Gartner1
-
3
-
-
84937853874
-
A secure biometrics-based multi-server authentication protocol using smart cards
-
Jun.
-
V. Odelu, A. K. Das, and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards," IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1953-1966, Jun. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.9
, pp. 1953-1966
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
4
-
-
79960940984
-
Near field communication
-
July
-
R. Want, "Near field communication," IEEE Pervasive Comput., vol.10, no.3, pp. 4 - 7, July. 2011.
-
(2011)
IEEE Pervasive Comput.
, vol.10
, Issue.3
, pp. 4-7
-
-
Want, R.1
-
5
-
-
84924347568
-
NFC based health monitoring and controlling system
-
Lonavala, India, Dec.
-
V. Patil, N. Varma, S. Vinchurkar, and B. Patil, "NFC based health monitoring and controlling system," in Proc. IEEE Global Conference on Wireless Computing and Networking, Lonavala, India, pp. 133-137, Dec. 2014.
-
(2014)
Proc. IEEE Global Conference on Wireless Computing and Networking
, pp. 133-137
-
-
Patil, V.1
Varma, N.2
Vinchurkar, S.3
Patil, B.4
-
6
-
-
84880839683
-
A survey on near field communication (NFC) technology
-
Aug.
-
V. Coskun, B. Ozdenizci, and K. Ok, "A survey on near field communication (NFC) technology," Wireless Pers. Commun., vol. 71, no. 3, pp. 2259-2294, Aug. 2013.
-
(2013)
Wireless Pers. Commun.
, vol.71
, Issue.3
, pp. 2259-2294
-
-
Coskun, V.1
Ozdenizci, B.2
Ok, K.3
-
7
-
-
84928568693
-
Near-field communication: It pays: Mobile payment systems explained and explored
-
Apr.
-
W. Lumpkins and M. Joyce, "Near-Field Communication: It Pays: Mobile payment systems explained and explored," IEEE Consum. Electron. Mag., vol.4, no.2, pp.49-53, Apr. 2015.
-
(2015)
IEEE Consum. Electron. Mag.
, vol.4
, Issue.2
, pp. 49-53
-
-
Lumpkins, W.1
Joyce, M.2
-
8
-
-
34547970838
-
Pervasive RFID and near field communication technology
-
July
-
F. Michahelles, F. Thiesse, A. Schmidt, and J. R. Williams, "Pervasive RFID and near field communication technology," IEEE Pervasive Comput., vol. 6, no. 3, pp. 94-95, July. 2007.
-
(2007)
IEEE Pervasive Comput.
, vol.6
, Issue.3
, pp. 94-95
-
-
Michahelles, F.1
Thiesse, F.2
Schmidt, A.3
Williams, J.R.4
-
10
-
-
46649114571
-
An assessment of NFC for future mobile payment systems
-
Toronto, Canada, July
-
J. Ondrus and Y. Pigneur, "An assessment of NFC for future mobile payment systems," in Proc. International Conference on the Management of Mobile Business, Toronto, Canada, pp. 43-43, July 2007.
-
(2007)
Proc. International Conference on the Management of Mobile Business
, pp. 43
-
-
Ondrus, J.1
Pigneur, Y.2
-
14
-
-
84914674658
-
A novel approach privacy security protocol based SUPM method in near field communication technology
-
Kumaracoil, India, Nov.
-
S. Kannadhasan, M. Isaivani, and G. Karthikeyan, "A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology," in Proc. Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Kumaracoil, India, vol. 324, pp. 633-643, Nov. 2014.
-
(2014)
Proc. Artificial Intelligence and Evolutionary Algorithms in Engineering Systems
, vol.324
, pp. 633-643
-
-
Kannadhasan, S.1
Isaivani, M.2
Karthikeyan, G.3
-
15
-
-
82755161820
-
Securing mobile network prefix provisioning for NEMO based vehicular networks
-
Jan.
-
J. H. Lee, J. Chen, and T. Ernst, "Securing mobile network prefix provisioning for NEMO based vehicular networks," Math. Comput. Model., vol. 55, no. 1, pp. 170-187, Jan. 2012.
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.1
, pp. 170-187
-
-
Lee, J.H.1
Chen, J.2
Ernst, T.3
-
16
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Montréal, QC, Canada, Sept.
-
G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM International Workshop on Vehicular Ad hoc Networks, Montréal, QC, Canada, pp. 19-28, Sept. 2007.
-
(2007)
Proc. ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.P.3
Lioy, A.4
-
17
-
-
84876136714
-
Conditional privacy preserving security protocol for NFC applications
-
Apr.
-
H. Eun, H. Lee, and H. Oh, "Conditional privacy preserving security protocol for NFC applications," IEEE Trans. Consumer Electron., vol. 59, no. 1, pp.153-160, Apr. 2013.
-
(2013)
IEEE Trans. Consumer Electron.
, vol.59
, Issue.1
, pp. 153-160
-
-
Eun, H.1
Lee, H.2
Oh, H.3
-
18
-
-
84926037301
-
Secure pseudonym-based near field communication protocol for the consumer internet of things
-
Mar.
-
D. He, N. Kumar, and J. H. Lee, "Secure pseudonym-based near field communication protocol for the consumer internet of things," IEEE Trans. Consumer Electron., vol. 61, no. 1, pp. 56-62, Mar. 2015.
-
(2015)
IEEE Trans. Consumer Electron.
, vol.61
, Issue.1
, pp. 56-62
-
-
He, D.1
Kumar, N.2
Lee, J.H.3
-
19
-
-
84928801756
-
A secure and efficient ECCbased user anonymity preserving single sign-on scheme for distributed computer networks
-
Jun.
-
V. Odelu, A. K. Das, and A. Goswami, "A secure and efficient ECCbased user anonymity preserving single sign-on scheme for distributed computer networks," Secur. Comm. Netw., vol. 8, no. 9, pp. 1732-1751, Jun. 2015.
-
(2015)
Secur. Comm. Netw.
, vol.8
, Issue.9
, pp. 1732-1751
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
20
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
Jun.
-
D. Basin, S. Mödersheim, and V. Luca, "OFMC: A symbolic model checker for security protocols," Int. J. Inf. Secur., vol. 4, no. 3 pp. 181- 208, Jun. 2005.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Luca, V.3
-
21
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security protocols and Applications
-
Scotland, UK, LNCS, July
-
A. Armando et al., "The AVISPA Tool for the Automated Validation of Internet Security protocols and Applications," in Proc. International Conference on Computer Aided Verification, Scotland, UK, LNCS, vol. 3576, pp. 281-285, July 2005.
-
(2005)
Proc. International Conference on Computer Aided Verification
, vol.3576
, pp. 281-285
-
-
Armando, A.1
-
22
-
-
84870657665
-
An novel three-party authentication key exchange protocol using one-time key
-
Jan.
-
C. Lv, M. Ma, H. Li, J. Ma, and Y. Zhang, "An novel three-party authentication key exchange protocol using one-time key," J. Netw. Comput. Appl., vol. 36, no. 1, pp. 498-503, Jan. 2013.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 498-503
-
-
Lv, C.1
Ma, M.2
Li, H.3
Ma, J.4
Zhang, Y.5
-
23
-
-
84929837704
-
A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
-
Jun.
-
A. K. Das, "A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks," Wireless Pers. Commun., vol. 82, no. 3, pp. 1377- 1404, Jun. 2015.
-
(2015)
Wireless Pers. Commun.
, vol.82
, Issue.3
, pp. 1377-1404
-
-
Das, A.K.1
-
24
-
-
85005969862
-
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
-
accepted for publication Jan.
-
A. K. Das, "A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor," accepted for publication in Int. J. Commun. Syst., Jan. 2015.
-
(2015)
Int. J. Commun. Syst.
-
-
Das, A.K.1
-
25
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev, and A. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
|