Combining World Wide Web and Wireless Security
نویسندگان
چکیده
In current electronic commerce systems, customers have an on-line interaction with merchants via a browser on their personal computer. Also payment is done electronically via the Internet, mostly with a credit card. In parallel to this, e-services via wireless-only systems are emerging. This paper identifies security and functionality weaknesses in both of these current approaches. The paper discusses why and how generalpurpose mobile devices could be used as an extension to PC based systems, to provide more security and functionality. General-purpose mobile devices are shown to be an alternative to costly special-purpose hardware. This combined approach has in many cases more interesting properties than when using mobile devices only. As an example of the combined approach, a GSM based electronic payment system is proposed and investigated. The system enables users to order goods through the World Wide Web and pay by using their mobile phone.
منابع مشابه
Software-Based Receipt-Freeness in On-Line Elections
11 A Role-Based Specification of the SET Payment Transaction Protocol Hideki Sakurada, Yasuyuki Tsukada Information Security: Mutual Authentication in E-Commerce S. H. Von Solms, M. V. Kisimov Software-Based Receipt-Freeness in On-Line Elections Emmanouil Magkos, Vassilios Chrissikopoulos, Nikos Alexandris ID-Based Structured Multisignature Schemes ChihY i n Lin, TzongChen Wu, JingJang Hwang Pr...
متن کاملIdentification of Fraud in Banking Data and Financial Institutions Using Classification Algorithms
In recent years, due to the expansion of financial institutions,as well as the popularity of the World Wide Weband e-commerce, a significant increase in the volume offinancial transactions observed. In addition to the increasein turnover, a huge increase in the number of fraud by user’sabnormality is resulting in billions of dollars in lossesover the world. T...
متن کاملIdentification of Fraud in Banking Data and Financial Institutions Using Classification Algorithms
In recent years, due to the expansion of financial institutions,as well as the popularity of the World Wide Weband e-commerce, a significant increase in the volume offinancial transactions observed. In addition to the increasein turnover, a huge increase in the number of fraud by user’sabnormality is resulting in billions of dollars in lossesover the world. T...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملEnsuring Security in WAP and Usability in WAP Applications
Keeping pace with the growing communication need of modern life today’s technology also is focusing towards pervasive computing and ubiquitous computing. Computing devices are becoming smaller and multi-purpose wireless devices like palm-top PCs, PDAs, mobile phones are becoming more popular. Access to the World Wide Web from such devices is usually done through Wireless Application Protocol (W...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Informatica (Slovenia)
دوره 26 شماره
صفحات -
تاریخ انتشار 2001