Identity Authentication Security Management in Mobile Payment Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication and Payment in Future Mobile Systems

This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocol; this payment protocol allows for the provision of incontestable charging. The problem of establishing authenticated public keys thro...

متن کامل

A Survey on Mobile Payment Systems Security

In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attent...

متن کامل

Secure Authentication Protocol for NFC Mobile Payment Systems

Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...

متن کامل

Security in Electronic Payment Systems

The underlying model of an electronic payment system consists of three parties: a bank, a customer, and a shop. There are three different types of transactions within the system: withdrawal involving the bank and the customer, payment involving the customer and the shop, and deposit involving the shop and the bank. The customer's account is debited during withdrawal, and the shop is credited du...

متن کامل

DRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, public safety, remote authentication, usable security

82 There is a need for cybersecurity capabilities and features to protect the Nationwide Public 83 Safety Broadband Network (NPSBN). However, cybersecurity requirements should not 84 compromise the ability of first responders to complete their missions. In addition, the diversity of 85 public safety disciplines means that one solution may not meet the usability needs of different 86 disciplines...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Global Information Management

سال: 2020

ISSN: 1062-7375,1533-7995

DOI: 10.4018/jgim.2020010110