Beyond Parasitic Authentication

نویسندگان

  • Lucas C. Ferreira
  • Ricardo Dahab
چکیده

Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices used in the authentication process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Mutual Authentication of B3G devices within Personal Distributed Environments

The Personal Distributed Environment (PDE) is a new concept arising in personal communications beyond 3G (B3G). This paper briefly describes the environment, surveys the protocols available to provide PDE authentication, and assesses their suitability for adaptation to the PDE.

متن کامل

Update to the Extensible Authentication Protocol (EAP) Applicability Statement for Application Bridging for Federated Access Beyond Web (ABFAB)

This document updates the Extensible Authentication Protocol (EAP) applicability statement from RFC 3748 to reflect recent usage of the EAP protocol in the Application Bridging for Federated Access Beyond web (ABFAB) architecture. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this d...

متن کامل

Parasitic Authentication

This paper focuses on protocols for human smartcard interaction which allow the user to authorise individual smartcard transactions whilst not sacri cing useability or security In the past protocols for secure transactions have traded o useabil ity against security whereas the protocols presented here are designed so that they tradeo security against hardware complexity and always give high use...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001