• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 17
Next 10 →

A Proposed NFC Payment Application

by Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea
"... based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they h ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth

1 A Secure Cloud-based NFC Mobile Payment Protocol

by Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea
"... Abstract Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC tr ..."
Abstract - Add to MetaCart
to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element (SE) in the mobile device

ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

by Kai Fan , Panfei Song , Yintang Yang
"... As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people's attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile ..."
Abstract - Add to MetaCart
payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without

www.ijacsa.thesai.org A Secure Cloud-Based Nfc Mobile Payment Protocol

by Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea, Uxbridge Uk
"... Abstract—Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC tr ..."
Abstract - Add to MetaCart
to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used

Efficient e-cash in practice: Nfc-based payments for public transportation systems

by Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Christof Paar, Wayne P. Burleson - In PETS , 2013
"... Abstract. Near field communication (NFC) is a recent popular technology that will facilitate many aspects of payments with mobile tokens. In the domain of public transportation payment systems electronic payments have many benefits, including improved throughput, new capabilities (congestion-based p ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract. Near field communication (NFC) is a recent popular technology that will facilitate many aspects of payments with mobile tokens. In the domain of public transportation payment systems electronic payments have many benefits, including improved throughput, new capabilities (congestion

Automated Antenna Impedance Adjustment for Near Field Communication (NFC)

by Michael Gebhart , Thomas Baier , Marc Facchini
"... Abstract-Near Field Communication (NFC) is a very intuitive way to open a communication link, to authenticate, or to implement a payment by simply bringing two mobile personal devices closely together. NFC is based upon reliable contactless card technology and combines most prominent protocol stand ..."
Abstract - Add to MetaCart
Abstract-Near Field Communication (NFC) is a very intuitive way to open a communication link, to authenticate, or to implement a payment by simply bringing two mobile personal devices closely together. NFC is based upon reliable contactless card technology and combines most prominent protocol

Session Key Authentication Mechanisms for Wireless Sensor Network Users

by Savitha S. V, Jisha K
"... Abstract- Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been prop ..."
Abstract - Add to MetaCart
proposed. This paper shows some security weaknesses in those schemes. As the main contribution of this paper, a secure and light-weight authentication scheme with user anonymity is presented. It is simple to implement for mobile user since it only performs a symmetric encryption/decryption operation

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

by Adarsh Kumar , Krishna Gopal , Alok Aggarwal , Adarsh Kumar
"... Abstract Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryp ..."
Abstract - Add to MetaCart
cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes

Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures

by Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu - In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’13 , 2013
"... Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive services on a phone without the user’s consent, thus compromising the security and privacy of the user. The problem is exacerbated especially in the context of emerging payment applications, such as NFC ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
, with quite low false positives and false negatives, while imposing little to no additional burden on the users. Index Terms—malware; mobile devices; NFC; context recognition; sensors F 1

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Next 10 →
Results 1 - 10 of 17
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University