Identity Authentication Security Management in Mobile Payment Systems
نویسندگان
چکیده
منابع مشابه
Authentication and Payment in Future Mobile Systems
This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocol; this payment protocol allows for the provision of incontestable charging. The problem of establishing authenticated public keys thro...
متن کاملA Survey on Mobile Payment Systems Security
In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attent...
متن کاملSecure Authentication Protocol for NFC Mobile Payment Systems
Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...
متن کاملSecurity in Electronic Payment Systems
The underlying model of an electronic payment system consists of three parties: a bank, a customer, and a shop. There are three different types of transactions within the system: withdrawal involving the bank and the customer, payment involving the customer and the shop, and deposit involving the shop and the bank. The customer's account is debited during withdrawal, and the shop is credited du...
متن کاملDRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, public safety, remote authentication, usable security
82 There is a need for cybersecurity capabilities and features to protect the Nationwide Public 83 Safety Broadband Network (NPSBN). However, cybersecurity requirements should not 84 compromise the ability of first responders to complete their missions. In addition, the diversity of 85 public safety disciplines means that one solution may not meet the usability needs of different 86 disciplines...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Global Information Management
سال: 2020
ISSN: 1062-7375,1533-7995
DOI: 10.4018/jgim.2020010110