IMAPS: Imbricated authentication protocol suite for mobile users and groups

Author(s):  
Nidal Aboudagga ◽  
Giacomo de Meulenaer ◽  
Mohamed Eltoweissy ◽  
Jean-Jacques Quisquater
Author(s):  
Gregor V. Bochmann ◽  
Eric Zhen Zhang

The requirements for an authentication infrastructure for electronic commerce are explained by identifying the partners involved in e-commerce transactions and the trust relationships required. Related security requirements are also explained, such as authentication, access rights, payment credentials, anonymity (in certain cases), and privacy and integrity of message exchanges. Then several general authentication schemes and specific protocols are reviewed and their suitability for mobile users is discussed. Finally, an improved authentication protocol is presented which can provide trust relationships for mobile e-commerce users. Its analysis and comparison with other proposed authentication protocols indicate that it is a good candidate for use in the context of mobile e-commerce.


2008 ◽  
pp. 3765-3783
Author(s):  
Gregor V. Bochmann ◽  
Eric Zhen Zhang

The requirements for an authentication infrastructure for electronic commerce are explained by identifying the partners involved in e-commerce transactions and the trust relationships required. Related security requirements are also explained, such as authentication, access rights, payment credentials, anonymity (in certain cases), and privacy and integrity of message exchanges. Then several general authentication schemes and specific protocols are reviewed and their suitability for mobile users is discussed. Finally, an improved authentication protocol is presented which can provide trust relationships for mobile e-commerce users. Its analysis and comparison with other proposed authentication protocols indicate that it is a good candidate for use in the context of mobile e-commerce.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Yuting Li ◽  
Qingfeng Cheng ◽  
Jinzheng Cao

As a component of mobile communication, the pay-TV system has attracted a lot of attention. By using mobile devices, users interact with the head end system in service providers to acquire TV services. With the growth of mobile users, how to protect the privacy of users while improving efficiency of the network has become an issue worthy of attention. Anonymous authentication schemes for mobile pay-TV systems came into being. In this paper, we analyze the shortcomings of the existing authentication protocol and then propose an improved one, which is secure against stored set attack and user traceability attack. The proposed scheme is proved to be secure. Moreover, our new scheme performs better in efficiency and storage, compared with several other schemes.


2003 ◽  
Vol 16 (9) ◽  
pp. 799-808 ◽  
Author(s):  
Cheng-Chi Lee ◽  
Chao-Chen Yang ◽  
Min-Shiang Hwang

2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document