How to construct random functions
Journal of the ACM (JACM)
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Message authentication with one-way hash functions
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The ESPRIT Project CAFE - High Security Digital Payment Systems
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Applied Information Security for m-Commerce and Digital Television Environments
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Hi-index | 4.10 |
The electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechanisms require users to enter a PIN or password every time they wish to perform a transaction. More sophisticated techniques include using a biometric device, such as a fingerprint scanner, which is integrated into the e-wallet. Both of these options have disadvantages. Usability problems due to authentication are a significant barrier to the adoption of e-wallets. In this article, the authors present some uses of existing protocols whereby a concealable, wireless, and portable device can temporarily act as an authentication proxy for the user. The e-wallet then becomes a parasite-feeding off the small device for required authentication and identification information. Parasitic authentication attempts to provide handheld computers with security without reducing convenience.