Secure Bluetooth for Trusted m-Commerce
نویسندگان
چکیده
منابع مشابه
Secure M-commerce
M-commerce is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, we identify the special characteristics of m-commerce and reflect on some important security issues.
متن کاملASEMC: Authentication for a SEcure M-Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...
متن کاملSecure M-Commerce with WPKI
The huge success of mobile telephone is about to transform ebusiness and the Internet. As a Personal Trusted Device PTD, the mobile phone, will be able to handle secure transactions in a wireless world. The Wireless Application Protocol (WAP) suite enables secure e-commerce services and applications. This paper present an overview of the PKI and the WAP environments and their relation to the In...
متن کاملSemantic-enhanced Bluetooth discovery protocol for m-commerce applications
We present a novel resource discovery framework for mcommerce. We extend the original Bluetooth Service Discovery Protocol by integrating a semantic layer within the application level of the standard. Given a request, this layer makes possible an enhanced discovery process exploiting the semantics of the resources descriptions exposed by a hotspot. The enhancement is compatible with the basic d...
متن کاملTowards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
Certified exchange of messages is an essential mechanism for e-commerce; the timing aspects (timeouts and timestamps) are very important for practical applications. However existing formal methods for security analysis assume simplified completely synchronous or completely asynchronous models, and cannot deal with the timing aspects of these (and other e-commerce) protocols. We present model fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communications, Network and System Sciences
سال: 2013
ISSN: 1913-3715,1913-3723
DOI: 10.4236/ijcns.2013.66030