NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Security Issues in Mobile eCommerce
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
A Subjective Metric of Authentication
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Architecture of authentication mechanism for emerging t-commerce environments
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part I
A study on authentication mechanism using robot vacuum cleaner
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
With the emergence of convergent information devices capable of delivering multimedia content and providing a network communication independent of location, new challenges regarding the creation of secure environments for conducting business electronically have arisen. Digital television (d-TV) uses highbandwidth connections to provide on-demand pay-per-view multimedia content and value-added services, such as electronic shopping. Mobile electronic commerce (m-Commerce) extends these new business models into a wireless world. Both technologies share similar requirements in terms of information security, as they require proper authentication, message integrity and confidentiality of business contracts and personal preferences. This paper presents protocols and infrastructure considerations to deal with the specific challenges arising from these applications: limited computational power, simple transfer of device ownership and transfer of access privileges between devices. The security requirements of future-generation electronic commerce applications are surveyed and protocols for use with these applications are discussed. In this context, trust-based authentication mechanisms (relying on recommendations and revocations) are adopted, in order to avoid static hierarchies and the need for central certification authorities.