The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of identity authentication in mobile-commerce system is a very important task, and its safety assessment is especially complicated. The Analytic Hierarchy Process (AHP) is an effective tool on transformation of question from half-qualitative and half-quantitative to quantitative. In this paper, applies AHP method to the safety assessment, establishes an index system according to the international...
In this paper, the new OTP authentication scheme is based on two dimension bar code and can be adapted into M-commerce environment. Compared to traditional schemes, the scheme considers the strains of wireless network and mobile equipment. The scheme not only could isolate such problems of traditional schemes, but also could provide mutual authentication between the user and the server and the security...
This paper analyzed the shortages of S/KEY OTP system in mobile commerce identity authentication and suggested an improved one-time password system based on bidirectional virtual authorization in mobile application systems. On one hand, this suggestion can reduce the calculation stress of both client and server, accordingly increases the efficiency of authorization and withstands the DoS attack. On...
Most important things of secure communications are integrity and confidentiality. However, seldom cipher mode could achieve these two goals simultaneously. So, in this paper, a novel cipher mode is proposed to solve this scheme. The newly proposed mode is based on a previous work PCBC, which has the vulnerability that it permits the modification of swapping two ciphertext, which could pass the integrity...
The mobile E-commerce identity authentication requires the SMS resources occupied, the numbers of dialogue with servers and the data transmission as few as possible. According to the requirements above, we design an improved identity authentication mechanism - IEIA (Iterative Encryption Identity Authentication) based on Hash Function, and achieve it through J2ME. The mechanism separates the registered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.