E-COMMERCE PAYMENT AUTHENTICATION SYSTEM WITH SIM CARD
Abstract
Keywords
References
Alliance, S. C. (2008). What Makes a Smart Card Secure ?, (October), 37.
Bhavya Daya. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and …, 13.
Considerations, C. (2011). Secure Authentication for Mobile Internet Services Table of Contents, (December), 1–23.
Data, A. (2004). Shared key TLS usage within Ua interface, (May), 1–7.
Des, Z. U. R. E. R., & Bebber, K. Van. (2014). Dissertation.
Ferrari, J., & Mackinnon, R. (n.d.). Smart Cards : A Case Study.
Ge, H., Tate, S. R., Jacob, R. T., & Member, C. (2006). FLEXIBLE DIGITAL AUTHENTICATION TECHNIQUES.
Gemplus, Oberthur, & Schlumberger. (2003). Over-The-Air (OTA) technology, (October), 6.
Gsma. (2013). Mobile and Online Commerce Opportunities provided by the SIM, 44.
Guyot, V. (2010). Smart card, the invisible bullet. 9th European Conference on Information Warfare and Security 2010, ECIW 2010, 80–87.
International Organization for Standardization (ISO). (2005). ISO7816-4 Organization, security and commands for interchange, 2005.
Kak, A. (2015). Lecture 8 : AES : The Advanced Encryption Standard Lecture Notes on “ Computer and Network Security ” by Avi Kak ( kak@purdue.edu ) Goals : • To review the overall structure of AES and to focus particularly on the, (3).
Khalique, A., Singh, K., & Sood, S. (2010). A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards. International Journal of Computer Applications, 2(3), 26–30.
Liao, I. E., Lee, C. C., & Hwang, M. S. (2006). A password authentication scheme over insecure networks. Journal of Computer and System Sciences, 72(4), 727–740.
Merchant, F. M. (2016). Miva PA-DSS Implementation Guide, (May), 1–28.
Module, S. I., & Equipment, M. (1996). GSM Digital cellular telecommunications system Specification of the Subscriber Identity Module.
Paper, W. (n.d.). Dynamic SIM Allocation TM.
Penttinen, J. T. J. (n.d.). Wireless Communications Security Wireless Communications Security Solutions for the.
Pourali, A., & Yektaie, M. H. (2014). A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms, 431–443.
Procedures, S. A. (2010). Payment Card Industry ( PCI ) Payment Application Data Security Standard Requirements and Security Assessment Procedures. October, (October), 73.
Requirements, Q. (2012). International Standard Iso / Iec, 25021.
Sommerville, I. (2010). Software Engineering. Software Engineering.
Specification, C. (2006). GlobalPlatform, (March).
Standard, I. (2008). INTERNATIONAL STANDARD ISO / IEC AMENDMENT 2 : Conservation of prefixes, 2008.
Thompson, G. S. (2015). PAYMENT SECURITY AND THE EMV CHIP TRANSITION by Gary Scott Thompson A Capstone Project Submitted to the Faculty of Utica College December 2015 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity i, (December).
Thorsen, L. T. (2016). Multi-factor Authentication using Secure Elements.
Vahidian, E. (2013). Evolution of the SIM to eSIM.
Votano, J., Parham, M., & Hall, L. (2004). Smart Card & Security Basics. Retrieved from http://onlinelibrary.wiley.com/doi/10.1002/cbdv.200490137/abstract
Wang, H. (n.d.). Secure Wireless Payment Protocol. Processing.
Wang, H. (n.d.). Secure Wireless Payment Protocol.
Wohlin, C., Šmite, D., & Moe, N. B. (2015). A general theory of software engineering: Balancing human, social and organizational capitals. Journal of Systems and Software, 109, 229–242.
Zanero, S. (2002). Smart Card Content Security. Dipartimento Di Elettronica E Informazione. Retrieved from
Zhu, Y. (2010). Architecture For Secure Two Party Mobile Payment Transaction.
Snowdon, Elizabeth. (2011). Prototyping And Usability Testing Your Design.
Alwahhab, Eman Abed. (2014). Prototyping.
Trend Micro. (2015). Next Generation Payment Processing Architecture.
Grabbe, J. Orlin. (2014). The DES Algorithm Illustrated.
Ab, E. (2016). Bootstrapping Security, (February).
HID. (2006). Understanding Card Data Formats, 1–5.
Refbacks
- There are currently no refbacks.
Jumlah Pengunjung :