Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Short-range wireless technologies with mobile payments systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Bluetooth as an Enabling Technology in Mobile Transactions
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
P2P-Paid: A Peer-to-Peer Wireless Payment System
WMCS '05 Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
Exploring consumer adoption of mobile payments - A qualitative study
The Journal of Strategic Information Systems
Authenticating ad hoc networks by comparison of short digests
Information and Computation
NFC Devices: Security and Privacy
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Man-in-the-Middle Attack to the HTTPS Protocol
IEEE Security and Privacy
Usability and security of out-of-band channels in secure device pairing protocols
Proceedings of the 5th Symposium on Usable Privacy and Security
Near-field communication-based secure mobile payment service
Proceedings of the 11th International Conference on Electronic Commerce
Using a personal device to strengthen password authentication from an untrusted computer
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Securing Bluetooth-based payment system using honeypot
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Man-in-the-middle in tunnelled authentication protocols
Proceedings of the 11th international conference on Security Protocols
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Hi-index | 0.00 |
The pervasive use of mobile phones has created a dynamic computing platform that a large percentage of the population carries routinely. There is a growing trend of integrating mobile phones with electronic identity, giving the phone the ability to prove or support the identity of the owner by containing, for example, a tuple of name, ID, photo and public key. While this helps phone owners prove who they are, it does not prove to them that they are giving their identities to intended parties. This is important in its own right for reasons of privacy and avoiding cases of "identity theft,,,but all the more important when identity is being provided to support the transfer of value (e.g. in mobile payment) or information. In this paper we show how Human Interactive Security Protocols can support this type of authentication in cases where PKIs are inappropriate, misunderstood or too expensive, concentrating on the case of payment.