A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Combining Authentication and Lightweight Payment for Active Networks
[chapter]
2000
Telecommunication Network Intelligence
Our scheme is secure, light-weight and efficient: It saves space in the packet headers, and the security is higher than that of separate algorithms for authentication and cost accounting. ...
For the payment function code packets must carry some form of light-weight electronic cash. Cryptographic schemes can be used to solve both the security and the payment/resource management problem. ...
Several authors have proposed the use of light-weight accounting schemes to control resource consumption; see for example [Tsch97] . 2. ...
doi:10.1007/978-0-387-35522-1_26
dblp:conf/smartnet/WeisEL00
fatcat:f2r62rpmfbakrdak3qemx66b7a
The classic security application in M2M: the authentication scheme of Mobile Payment
2012
KSII Transactions on Internet and Information Systems
Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. ...
Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. ...
Additionally, considerring with the constraits above, an essential requirement is that the authentication system has to be light-weight [46] . ...
doi:10.3837/tiis.2012.01.008
fatcat:kmy6qvgdznbddkduesabf353k4
Reliable OSPM schema for secure transaction using mobile agent in micropayment system
2013
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce ( ...
Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead. ...
RELATED WORK Zhi-Yuan Hu [6] has introduced a novel and realistic authentication system termed as anonymous micropayments authentication that is targeted for micropayments in mobile data network. ...
doi:10.1109/icccnt.2013.6726503
fatcat:ug6ibosv4rcqfdcgwtcfrz4hgi
A Review on Identity based Cryptography
2015
International Journal of Computer Applications
Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. ...
Security in mobile ad-hoc networks (MANET's) continues to draw in attention when years of analysis. ...
The authors style a light-weight and cheat-resistant micropayment theme to stimulate and compensate cooperative peers that sacrifice their resources to relay packets for alternative peers. ...
doi:10.5120/21127-3889
fatcat:wzbzwc374feu3axa3oikezqs3a
A Review on Performance of Online Transaction Algorithms in Cloud Environment
2020
International Journal of Engineering Research and
This paper proposes a model that integrates the traditional authentication method with Hashing algorithm and performing a secured encryption using Elliptical Curve Cryptography (ECC).This model evades ...
and addresses the security issues in cloud computing. ...
This project proposes a three factor authentication which comprises of password, OTP and weighted pattern product. ...
doi:10.17577/ijertv9is050301
fatcat:wshtlfdhfzdqppwkrow5hqbt74
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT
2020
IEEE Access
In the article ''Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT,'' by Chen et al., the authors propose a lightweight and privacy-preserving authentication ...
protocol for mobile payment in the context of the IoT. ...
doi:10.1109/access.2020.3040469
fatcat:ixv7f7mk65bqrbepyd7v5vcxle
A Multifactor Secure Authentication System for Wireless Payment
[chapter]
2010
Emergent Web Intelligence: Advanced Information Retrieval
This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases ...
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data ...
The J2ME supports many powerful features of the Java programming language as a light-weight virtual machine (KVM) , it also provides a secure and easy execution environment for mobile devices [23] . ...
doi:10.1007/978-1-84996-074-8_13
dblp:series/aikp/SanyalTS10
fatcat:uqr4x4vvnzamhk26uq2grnv6va
Economic tussles in federated identity management
2012
First Monday
Many explanations have been given for its slow uptake, from disputes over liability assignment for authentication failures to concerns over privacy. ...
Federated identity management (FIM) enables a user to authenticate once and access privileged information across many disparate domains. ...
Merchants blame outdated authentication mechanisms in payment card networks for fraud, while the payment networks blame merchants for lax operational security. ...
doi:10.5210/fm.v17i10.4254
fatcat:n2o3fukodzhopo6citmlpxl27i
Video Face Recognition of Virtual Currency Trading System based on Deep Learning Algorithms
2021
IEEE Access
Video face detection algorithm based on multi-task Cascaded Convolutional Networks is designed and implemented to solve the problems of pose, light and occlusion in the virtual currency trading system. ...
of virtual goods or services, exchange of virtual currency and other trading activities. ...
Based on the Lenet-5 model and combined with the characteristics of video face recognition, the network structure is optimized and designed, adding a convolutional layer and a pooling layer, and the activation ...
doi:10.1109/access.2021.3060458
fatcat:vnoyzmiyubg5fd7ab46gjisg6a
Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance the Information Assurance and Security Education
2012
International Journal of Advanced Computer Science and Applications
For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students ...
This paper describes an active learning module developed to help students understand secure protocols, algorithms and modeling web applications to prevent attacks and both software and hardware implementations ...
Light-weight-crypto algorithms such as Simplified-DES take an 8-bit block of plaintext and a 10-bit key as input to produce an 8-bit block of ciphertext. ...
doi:10.14569/ijacsa.2012.030415
fatcat:vmhxzgcndfcjnapf7dk4yaagcy
Resource Adequacy: Should Regulators Worry?
2012
Review of Network Economics
Regulators have proposed various institutional alternatives to secure network resource adequacy and reasonably priced electric power for consumers. ...
These alternatives prompt many difficult questions: Does the development of Demand Response reduce the need for new capacity? ...
'make good' payments and active Distributors. ...
doi:10.1515/1446-9022.1391
fatcat:h63fvto7gfbs5aa2flkz6l6gkq
Exploring a Context-based Network Access Control for Mobile Devices
2015
Procedia Computer Science
In this paper, we propose a context-based analytic hierarchy process (AHP) framework for eliciting context information and adapting this information with network access control measures for mobile devices ...
Mobile devices currently offer many value-added applications and services such as emailing, messaging, navigation, social networking, finance, and entertainment. ...
Hayashi et al. 7 present a probabilistic model for context-aware scalable authentication in order to enable the selection of appropriate active authentication factors given a set of passive authentication ...
doi:10.1016/j.procs.2015.08.530
fatcat:q6sbsc2ysjfmrbetlglg2lwi3i
Security of IoT System using Blockchain
2020
International journal of recent technology and engineering
to authentication and data privacy. ...
The study is beneficial for those who are looking forward to deploying IoT applications. They can get to know what the prerequisites are to be met for a secure IoT system. ...
Shankraiah Head of the Department of Electronics and Communication Engineering for providing them timely suggestions, encouragement and support. ...
doi:10.35940/ijrte.a2692.059120
fatcat:c374kmfm7bhpfnsbwj4b7kvtja
Towards NFC payments using a lightweight architecture for the Web of Things
2014
Computing
The Web (and Internet) of Things has seen the rapid emergence of new protocols and standards which provide for innovative models of interaction for applications. ...
Contactless technology for the Web of Things requires all parties to agree one common definition and implementation and, in this paper, we propose a new lightweight architecture for the Web of Things, ...
The Authentication Centre of the mobile network operator is responsible for authenticating each SIM that attempts to connect to the core network through Mobile Switching Centre. ...
doi:10.1007/s00607-014-0397-6
fatcat:2mpsykxiovarfo3aszkbykatxe
The Proposed Model High-performance Grants Low Communication Latency to the Big Size of Data in a Secure and Private System-based on Blockchain with a Software-Defined Network (SDN)
2021
Journal of Human-centric Science and Technology Innovation
By including additional routing information when a packet passes through the root node for the first time in a light Node communication, when available, without significant overhead. ...
Results show that improves packet reception ratio, round-trip time, and energy usage of light Node communication compared to standard systems. ...
Introduction Satoshi Nakamoto proposed Bitcoin as the first cybernetic payment network drew on a decentralized peer-to-peer network [1] , unnecessarily need for a trusted third party. ...
doi:10.21742/jhsti.2021.1.3.08
fatcat:ezwdki5xajepzjbi6pztjlrxiy
« Previous
Showing results 1 — 15 out of 12,361 results