Journal of Systems and Software
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Hardware architectures for public key cryptography
Integration, the VLSI Journal
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Formal analysis of card-based payment systems in mobile devices
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
Journal of Theoretical and Applied Electronic Commerce Research
An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario
DEXA '07 Proceedings of the 18th International Conference on Database and Expert Systems Applications
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
A secure payment protocol for restricted connectivity scenarios in M-commerce
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Lightweight and provably secure user authentication with anonymity for the global mobility network
International Journal of Communication Systems
Payment in a kiosk centric model with mobile and low computational power devices
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Hi-index | 0.00 |
The authors propose a Secure and Optimized Mobile based Merchant Payment SOMMP Protocol using Signcryption scheme with Forward Secrecy SFS based on elliptic curve which consumes less computational and communication cost. In SOMMP client sends message in the form of TransCertC Transaction Certificate which is a X.509 SLC X.509 Short Lived Certificate thereby reducing the client interactions with the engaging parties thereby reducing the consumption of resources from Client's perspective which are very scarce in Resource Constrained Devices like Mobile Phones. In SOMMP protocol WSLC WPKI Short Lived Certificate eliminates the need of certificates validation and removes the hurdle of PKI thereby reducing storage space, communication cost and computational cost. Their proposed SOMMP ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these SOMMP withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed SOMMP protocol have been verified using BAN Logic, AVISPA and Scyther Tools and presented with results.