Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
Several practical protocols for authentication and key exchange
Information Processing Letters
Using encryption for authentication in large networks of computers
Communications of the ACM
AKA Protocols for Mobile Communications
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
A review for mobile commerce research and applications
Decision Support Systems
GSM mobile SMS/MMS using public key infrastructure: m-PKI
WSEAS Transactions on Computers
A high-level 3g wireless PKI solution for secure healthcare communications
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
A survey on mobile digital signature models
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
The popularity of handheld mobile devices and deployment of the public key infrastructure in many parts of the world have led to the development of electronic commerce on mobile devices. For the current version of mobile phones, the main challenge is the limited computing capacity on these devices for PKI-based end-to-end secure transactions. This paper presents a new architecture and protocol for authentication and key exchange as well as the supporting infrastructure that is suitable for the mobile phone environment. The system requirements and our solutions in addressing these requirements in the restrictive environment are discussed. An evaluation of the system performance is also included. The system has been implemented and is supporting some real-life applications.