Emerging mobile and wireless networks
Communications of the ACM
Analyzing Internet Security Protocols
HASE '01 The 6th IEEE International Symposium on High-Assurance Systems Engineering: Special Topic: Impact of Networking
Freshness Assurance of Authentication Protocols
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Research note: Replay tolerance of authentication protocols
Computer Communications
Feature: Enabling E-Commerce Through PKI
Network Security
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
Wireless Personal Communications: An International Journal
A review for mobile commerce research and applications
Decision Support Systems
Past, present and future of mobile payments research: A literature review
Electronic Commerce Research and Applications
A self-verification authentication mechanism for mobile satellite communication systems
Computers and Electrical Engineering
Security Analysis of Yeh-Tsai Security Mechanism
IEICE - Transactions on Information and Systems
A novel key agreement scheme in a multiple server environment
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
An ECC based public key infrastructure usable for mobile applications
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.24 |
This paper describes a lightweight security mechanism for protecting electronic transactions conducted over the mobile platform. In a typical mobile computing environment, one or more of the transacting parties are based on some wireless handheld devices. Electronic transactions conducted over the mobile platform are gaining popularity and it is widely accepted that mobile computing is a natural extension of the wired Internet computing world. However, security over the mobile platform is more critical due to the open nature of wireless networks. Furthermore, security is more difficult to implement on the mobile platform because of the resource limitation of mobile handheld devices. Therefore, security mechanisms for protecting traditional computer communications need to be revisited so as to ensure that electronic transactions involving mobile devices can be secured and implemented in an effective manner. This research is part of our effort in designing security infrastructure for electronic commerce systems, which extend from the wired to the wireless Internet. A lightweight mechanism was designed to meet the security needs in face of the resource constraints. The proposed mechanism is proven to be practical in real deployment environment.