ACM Transactions on Computer Systems (TOCS)
Authentication and delegation with smart-cards
TACS'91 Selected papers of the conference on Theoretical aspects of computer software
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Using encryption for authentication in large networks of computers
Communications of the ACM
Journal of Systems and Software
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Payments and banking with mobile personal devices
Communications of the ACM - Wireless networking security
Formal verification: an imperative step in the design of security protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
A new electronic traveler's check scheme based on one-way hash function
Electronic Commerce Research and Applications
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Mobile payment: A journey through existing procedures and standardization initiatives
IEEE Communications Surveys & Tutorials
A secure and optimized mobile payment framework with formal verification
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
In this paper, we propose a new payment instrument, i.e., mobile traveller's check (MTC) in the realm of mobile commerce. This payment instrument provides the merits of both e-cash and e-check, i.e., MTC can be used freely as an e-cash and it is as secure as an e-check. We present the mobile payment protocol based on MTC which uses elliptic curve digital signature algorithm (ECDSA) for generating and verifying digital signatures and DES for encrypting and decrypting the messages which are suitable for resource constrained devices like mobile phones. We use 'extended BAN' logic (Abadi et al., 1993) to provide a concise and clear understanding of this secure payment instrument (MTC). We formalise and verify the interactions and trust relationships among engaging entities.