Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Offline Micropayments without Trusted Hardware
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions
ICMB '05 Proceedings of the International Conference on Mobile Business
Hi-index | 0.00 |
Mobile devices might soon be the most popular payment mechanism for electronic payments and, therefore, the perfect candidate for apersonal trusted device. An electronic payment system (such as credit card networks)can perform e-payments by extending paymenttransactions to the handheld device. The need for security services, such as authentication, confidentiality, integrity, and nonrepudiation is paramount because heterogeneous wireless network technologies such as personal area networks, local area networks, and wide area networks have both well-known and yet-undiscovered security weaknesses. A Java-based, secure local macropayment system prototype retrieves electronic checks from a bank and uses them to pay vendors for goods and services, with different interaction levelsat the point of sale.