A Reusable Secure Mobile e-Coupon Protocol
نویسندگان
چکیده
منابع مشابه
A Secure E-coupon System for Mobile Users
Since nowadays mobile phone messages are flourishing, the application of electronic coupon (e-coupon) will become a trend for mobile users. E-coupon for mobile commerce can provide mobility for users and distribution flexibility for issuers. However, most of the existed e-coupon schemes usually apply public-key cryptosystem to achieve the security, which will not be implemented in mobile device...
متن کاملSecure E-payment Protocol
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down c...
متن کاملA Secure Mobile IP Registration Protocol
The wireless network develop is support mobility within the Internet at presently. The mobile Internet use Mobile IP technologies in the wireless Internet. This paper is concerned with the security aspect of the registration protocol in Mobile IP. In this paper we publish a new method use the secure-key combine minimal public-key besides produce the communication session key in mobile node regi...
متن کاملA Secure E-Tender Submission Protocol
There is fundamental difference between a simple e-tender box and a traditional physical tender box. Access to the e-tender box has become a private activity in contrast with the public access to a traditional tender box. A significant opportunity is therefore created for malicious business collusion by use of a simple e-tender box even though it may have cryptographic keys. This indicates that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Society of Computer and Information
سال: 2013
ISSN: 1598-849X
DOI: 10.9708/jksci.2013.18.10.081