Filters








12,361 Hits in 4.6 sec

Combining Authentication and Lightweight Payment for Active Networks [chapter]

Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks
2000 Telecommunication Network Intelligence  
Our scheme is secure, light-weight and efficient: It saves space in the packet headers, and the security is higher than that of separate algorithms for authentication and cost accounting.  ...  For the payment function code packets must carry some form of light-weight electronic cash. Cryptographic schemes can be used to solve both the security and the payment/resource management problem.  ...  Several authors have proposed the use of light-weight accounting schemes to control resource consumption; see for example [Tsch97] . 2.  ... 
doi:10.1007/978-0-387-35522-1_26 dblp:conf/smartnet/WeisEL00 fatcat:f2r62rpmfbakrdak3qemx66b7a

The classic security application in M2M: the authentication scheme of Mobile Payment

Liang Hu
2012 KSII Transactions on Internet and Information Systems  
Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network.  ...  Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved.  ...  Additionally, considerring with the constraits above, an essential requirement is that the authentication system has to be light-weight [46] .  ... 
doi:10.3837/tiis.2012.01.008 fatcat:kmy6qvgdznbddkduesabf353k4

Reliable OSPM schema for secure transaction using mobile agent in micropayment system

N. Chitra Kiran, G. Narendra Kumar
2013 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)  
However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (  ...  Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead.  ...  RELATED WORK Zhi-Yuan Hu [6] has introduced a novel and realistic authentication system termed as anonymous micropayments authentication that is targeted for micropayments in mobile data network.  ... 
doi:10.1109/icccnt.2013.6726503 fatcat:ug6ibosv4rcqfdcgwtcfrz4hgi

A Review on Identity based Cryptography

Sonia Thakur, Heena Heena
2015 International Journal of Computer Applications  
Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base.  ...  Security in mobile ad-hoc networks (MANET's) continues to draw in attention when years of analysis.  ...  The authors style a light-weight and cheat-resistant micropayment theme to stimulate and compensate cooperative peers that sacrifice their resources to relay packets for alternative peers.  ... 
doi:10.5120/21127-3889 fatcat:wzbzwc374feu3axa3oikezqs3a

A Review on Performance of Online Transaction Algorithms in Cloud Environment

Manju Subashini, Prabakaran D, IFET colllege of Engineering
2020 International Journal of Engineering Research and  
This paper proposes a model that integrates the traditional authentication method with Hashing algorithm and performing a secured encryption using Elliptical Curve Cryptography (ECC).This model evades  ...  and addresses the security issues in cloud computing.  ...  This project proposes a three factor authentication which comprises of password, OTP and weighted pattern product.  ... 
doi:10.17577/ijertv9is050301 fatcat:wshtlfdhfzdqppwkrow5hqbt74

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT

Kuo-Hui Yeh, Weizhi Meng, Sk Hafizul Islam, Kuan Zhang, Ennan Zhai
2020 IEEE Access  
In the article ''Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT,'' by Chen et al., the authors propose a lightweight and privacy-preserving authentication  ...  protocol for mobile payment in the context of the IoT.  ... 
doi:10.1109/access.2020.3040469 fatcat:ixv7f7mk65bqrbepyd7v5vcxle

A Multifactor Secure Authentication System for Wireless Payment [chapter]

Sugata Sanyal, Ayu Tiwari, Sudip Sanyal
2010 Emergent Web Intelligence: Advanced Information Retrieval  
This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases  ...  Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data  ...  The J2ME supports many powerful features of the Java programming language as a light-weight virtual machine (KVM) , it also provides a secure and easy execution environment for mobile devices [23] .  ... 
doi:10.1007/978-1-84996-074-8_13 dblp:series/aikp/SanyalTS10 fatcat:uqr4x4vvnzamhk26uq2grnv6va

Economic tussles in federated identity management

Susan Landau, Tyler Moore
2012 First Monday  
Many explanations have been given for its slow uptake, from disputes over liability assignment for authentication failures to concerns over privacy.  ...  Federated identity management (FIM) enables a user to authenticate once and access privileged information across many disparate domains.  ...  Merchants blame outdated authentication mechanisms in payment card networks for fraud, while the payment networks blame merchants for lax operational security.  ... 
doi:10.5210/fm.v17i10.4254 fatcat:n2o3fukodzhopo6citmlpxl27i

Video Face Recognition of Virtual Currency Trading System based on Deep Learning Algorithms

Jun Wei
2021 IEEE Access  
Video face detection algorithm based on multi-task Cascaded Convolutional Networks is designed and implemented to solve the problems of pose, light and occlusion in the virtual currency trading system.  ...  of virtual goods or services, exchange of virtual currency and other trading activities.  ...  Based on the Lenet-5 model and combined with the characteristics of video face recognition, the network structure is optimized and designed, adding a convolutional layer and a pooling layer, and the activation  ... 
doi:10.1109/access.2021.3060458 fatcat:vnoyzmiyubg5fd7ab46gjisg6a

Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance the Information Assurance and Security Education

Dr. Yousif, Dr. Ajantha
2012 International Journal of Advanced Computer Science and Applications  
For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students  ...  This paper describes an active learning module developed to help students understand secure protocols, algorithms and modeling web applications to prevent attacks and both software and hardware implementations  ...  Light-weight-crypto algorithms such as Simplified-DES take an 8-bit block of plaintext and a 10-bit key as input to produce an 8-bit block of ciphertext.  ... 
doi:10.14569/ijacsa.2012.030415 fatcat:vmhxzgcndfcjnapf7dk4yaagcy

Resource Adequacy: Should Regulators Worry?

Hernan D. Bejarano, Lance Clifner, Carl Johnston, Stephen Rassenti, Vernon L. Smith
2012 Review of Network Economics  
Regulators have proposed various institutional alternatives to secure network resource adequacy and reasonably priced electric power for consumers.  ...  These alternatives prompt many difficult questions: Does the development of Demand Response reduce the need for new capacity?  ...  'make good' payments and active Distributors.  ... 
doi:10.1515/1446-9022.1391 fatcat:h63fvto7gfbs5aa2flkz6l6gkq

Exploring a Context-based Network Access Control for Mobile Devices

Yaser Mowafi, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily, Tareq Al-Aqarbeh, Marat Abilov, Viktor Dmitriyevr
2015 Procedia Computer Science  
In this paper, we propose a context-based analytic hierarchy process (AHP) framework for eliciting context information and adapting this information with network access control measures for mobile devices  ...  Mobile devices currently offer many value-added applications and services such as emailing, messaging, navigation, social networking, finance, and entertainment.  ...  Hayashi et al. 7 present a probabilistic model for context-aware scalable authentication in order to enable the selection of appropriate active authentication factors given a set of passive authentication  ... 
doi:10.1016/j.procs.2015.08.530 fatcat:q6sbsc2ysjfmrbetlglg2lwi3i

Security of IoT System using Blockchain

2020 International journal of recent technology and engineering  
to authentication and data privacy.  ...  The study is beneficial for those who are looking forward to deploying IoT applications. They can get to know what the prerequisites are to be met for a secure IoT system.  ...  Shankraiah Head of the Department of Electronics and Communication Engineering for providing them timely suggestions, encouragement and support.  ... 
doi:10.35940/ijrte.a2692.059120 fatcat:c374kmfm7bhpfnsbwj4b7kvtja

Towards NFC payments using a lightweight architecture for the Web of Things

Tor-Morten Grønli, Pardis Pourghomi, Gheorghita Ghinea
2014 Computing  
The Web (and Internet) of Things has seen the rapid emergence of new protocols and standards which provide for innovative models of interaction for applications.  ...  Contactless technology for the Web of Things requires all parties to agree one common definition and implementation and, in this paper, we propose a new lightweight architecture for the Web of Things,  ...  The Authentication Centre of the mobile network operator is responsible for authenticating each SIM that attempts to connect to the core network through Mobile Switching Centre.  ... 
doi:10.1007/s00607-014-0397-6 fatcat:2mpsykxiovarfo3aszkbykatxe

The Proposed Model High-performance Grants Low Communication Latency to the Big Size of Data in a Secure and Private System-based on Blockchain with a Software-Defined Network (SDN)

Saad Alshihri, Sogang University, SooYoung Park, Sogang University
2021 Journal of Human-centric Science and Technology Innovation  
By including additional routing information when a packet passes through the root node for the first time in a light Node communication, when available, without significant overhead.  ...  Results show that improves packet reception ratio, round-trip time, and energy usage of light Node communication compared to standard systems.  ...  Introduction Satoshi Nakamoto proposed Bitcoin as the first cybernetic payment network drew on a decentralized peer-to-peer network [1] , unnecessarily need for a trusted third party.  ... 
doi:10.21742/jhsti.2021.1.3.08 fatcat:ezwdki5xajepzjbi6pztjlrxiy
« Previous Showing results 1 — 15 out of 12,361 results