Designing a generic payment service
IBM Systems Journal
Electronic payment systems for E-Commerce
Electronic payment systems for E-Commerce
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Secure Account-Based Mobile Payment Protocol
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A System Model and Protocol for Mobile Payment
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Corporate Computer and Network Security
Corporate Computer and Network Security
A private and efficient mobile payment protocol
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Mobile payment: A journey through existing procedures and standardization initiatives
IEEE Communications Surveys & Tutorials
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Growing of wireless networks and popularity of handheld devices such as Personal Digital Assistants (PDAs), Smart phones, mobile phones and wireless tablets represents an incredible opportunity to give power to mobile devices as a payment device. Unfortunately, some problems hindering the widespread acceptance of mobile payment for example: accountability properties, privacy protection, limitation of wireless networks and mobile devices. Recently, many public-key cryptography protocols are presented for mobile payment. However, limited capabilities of mobile devices and wireless networks make these protocols unsuitable for mobile network. Moreover, these protocols were designed to preserve traditional flow of payment data, which is vulnerable to attack and increase the user's risk. In this paper, we propose a private mobile payment protocol which is based on client centric model and works by employing symmetric key operations. The proposed mobile payment protocol not only minimizes the computational operations and communications between the engaging parties, but also achieves a completely privacy protection for the payer, avoid repudiating transaction from each of them and decrease risk of replay attacks.