Beyond Parasitic Authentication
نویسندگان
چکیده
Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices used in the authentication process.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملMutual Authentication of B3G devices within Personal Distributed Environments
The Personal Distributed Environment (PDE) is a new concept arising in personal communications beyond 3G (B3G). This paper briefly describes the environment, surveys the protocols available to provide PDE authentication, and assesses their suitability for adaptation to the PDE.
متن کاملUpdate to the Extensible Authentication Protocol (EAP) Applicability Statement for Application Bridging for Federated Access Beyond Web (ABFAB)
This document updates the Extensible Authentication Protocol (EAP) applicability statement from RFC 3748 to reflect recent usage of the EAP protocol in the Application Bridging for Federated Access Beyond web (ABFAB) architecture. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this d...
متن کاملParasitic Authentication
This paper focuses on protocols for human smartcard interaction which allow the user to authorise individual smartcard transactions whilst not sacri cing useability or security In the past protocols for secure transactions have traded o useabil ity against security whereas the protocols presented here are designed so that they tradeo security against hardware complexity and always give high use...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کامل