Lam, Chung, Gu and Sun (2003) proposed a lightweight security mechanism for mobile commerce transactions to meet the security needs in the face of the resource constraints of mobile devices. End-to-end security between the mobile device and the mobile commerce provider is established. However, its security builds on the assumption that customers can confirm every mobile commerce provider's public key by themselves before each transaction. Moreover, the mechanism still produces high overhead on the mobile device. This paper elucidates the causes of these drawbacks, and an enhanced mechanism is also proposed to protect mobile commerce transactions more effectively and efficiently.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Tzu-Chang YEH, Shih-Chang TSAI, "Securing Mobile Commerce Transactions" in IEICE TRANSACTIONS on Communications,
vol. E89-B, no. 9, pp. 2608-2611, September 2006, doi: 10.1093/ietcom/e89-b.9.2608.
Abstract: Lam, Chung, Gu and Sun (2003) proposed a lightweight security mechanism for mobile commerce transactions to meet the security needs in the face of the resource constraints of mobile devices. End-to-end security between the mobile device and the mobile commerce provider is established. However, its security builds on the assumption that customers can confirm every mobile commerce provider's public key by themselves before each transaction. Moreover, the mechanism still produces high overhead on the mobile device. This paper elucidates the causes of these drawbacks, and an enhanced mechanism is also proposed to protect mobile commerce transactions more effectively and efficiently.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e89-b.9.2608/_p
Copy
@ARTICLE{e89-b_9_2608,
author={Tzu-Chang YEH, Shih-Chang TSAI, },
journal={IEICE TRANSACTIONS on Communications},
title={Securing Mobile Commerce Transactions},
year={2006},
volume={E89-B},
number={9},
pages={2608-2611},
abstract={Lam, Chung, Gu and Sun (2003) proposed a lightweight security mechanism for mobile commerce transactions to meet the security needs in the face of the resource constraints of mobile devices. End-to-end security between the mobile device and the mobile commerce provider is established. However, its security builds on the assumption that customers can confirm every mobile commerce provider's public key by themselves before each transaction. Moreover, the mechanism still produces high overhead on the mobile device. This paper elucidates the causes of these drawbacks, and an enhanced mechanism is also proposed to protect mobile commerce transactions more effectively and efficiently.},
keywords={},
doi={10.1093/ietcom/e89-b.9.2608},
ISSN={1745-1345},
month={September},}
Copy
TY - JOUR
TI - Securing Mobile Commerce Transactions
T2 - IEICE TRANSACTIONS on Communications
SP - 2608
EP - 2611
AU - Tzu-Chang YEH
AU - Shih-Chang TSAI
PY - 2006
DO - 10.1093/ietcom/e89-b.9.2608
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E89-B
IS - 9
JA - IEICE TRANSACTIONS on Communications
Y1 - September 2006
AB - Lam, Chung, Gu and Sun (2003) proposed a lightweight security mechanism for mobile commerce transactions to meet the security needs in the face of the resource constraints of mobile devices. End-to-end security between the mobile device and the mobile commerce provider is established. However, its security builds on the assumption that customers can confirm every mobile commerce provider's public key by themselves before each transaction. Moreover, the mechanism still produces high overhead on the mobile device. This paper elucidates the causes of these drawbacks, and an enhanced mechanism is also proposed to protect mobile commerce transactions more effectively and efficiently.
ER -