Results 1 - 10
of
17
A Proposed NFC Payment Application
"... based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they h ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth
1 A Secure Cloud-based NFC Mobile Payment Protocol
"... Abstract Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC tr ..."
Abstract
- Add to MetaCart
to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element (SE) in the mobile device
ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G
"... As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people's attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile ..."
Abstract
- Add to MetaCart
payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without
www.ijacsa.thesai.org A Secure Cloud-Based Nfc Mobile Payment Protocol
"... Abstract—Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC tr ..."
Abstract
- Add to MetaCart
to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used
Efficient e-cash in practice: Nfc-based payments for public transportation systems
- In PETS
, 2013
"... Abstract. Near field communication (NFC) is a recent popular technology that will facilitate many aspects of payments with mobile tokens. In the domain of public transportation payment systems electronic payments have many benefits, including improved throughput, new capabilities (congestion-based p ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
Abstract. Near field communication (NFC) is a recent popular technology that will facilitate many aspects of payments with mobile tokens. In the domain of public transportation payment systems electronic payments have many benefits, including improved throughput, new capabilities (congestion
Automated Antenna Impedance Adjustment for Near Field Communication (NFC)
"... Abstract-Near Field Communication (NFC) is a very intuitive way to open a communication link, to authenticate, or to implement a payment by simply bringing two mobile personal devices closely together. NFC is based upon reliable contactless card technology and combines most prominent protocol stand ..."
Abstract
- Add to MetaCart
Abstract-Near Field Communication (NFC) is a very intuitive way to open a communication link, to authenticate, or to implement a payment by simply bringing two mobile personal devices closely together. NFC is based upon reliable contactless card technology and combines most prominent protocol
Session Key Authentication Mechanisms for Wireless Sensor Network Users
"... Abstract- Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been prop ..."
Abstract
- Add to MetaCart
proposed. This paper shows some security weaknesses in those schemes. As the main contribution of this paper, a secure and light-weight authentication scheme with user anonymity is presented. It is simple to implement for mobile user since it only performs a symmetric encryption/decryption operation
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
"... Abstract Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryp ..."
Abstract
- Add to MetaCart
cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes
Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures
- In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’13
, 2013
"... Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive services on a phone without the user’s consent, thus compromising the security and privacy of the user. The problem is exacerbated especially in the context of emerging payment applications, such as NFC ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
, with quite low false positives and false negatives, while imposing little to no additional burden on the users. Index Terms—malware; mobile devices; NFC; context recognition; sensors F 1
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Results 1 - 10
of
17