2005
DOI: 10.1007/978-3-540-31815-6_25
|View full text |Cite
|
Sign up to set email alerts
|

A Limited-Used Key Generation Scheme for Internet Transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 4 publications
0
12
0
1
Order By: Relevance
“…Our proposed work is different from other existing payment systems in that it employs Limited-used key generation technique [17] rather than cyclic-shifting technique. When C first registers with PG, the master key Y is generated by PG and stored on the SIM Card into C (Smart Phone) in order to share the distributed key Y.…”
Section: B Enhanced Session Key Generation Techniquementioning
confidence: 97%
“…Our proposed work is different from other existing payment systems in that it employs Limited-used key generation technique [17] rather than cyclic-shifting technique. When C first registers with PG, the master key Y is generated by PG and stored on the SIM Card into C (Smart Phone) in order to share the distributed key Y.…”
Section: B Enhanced Session Key Generation Techniquementioning
confidence: 97%
“…A number of session key generation and distribution techniques have been proposed [5,[7][8][9][10][11][12][13]. Among the above techniques, Kungpisdan et al [8] introduced a session key generation technique that not only it is secure against key compromise attacks, but it can also operate purely offline. According to this technique, the engaging parties do not need to transmit session keys over the network.…”
Section: ) Session Key Generation and Distributionmentioning
confidence: 99%
“…Several dynamic key generation schemes [17] [18] have been proposed. The principle of dynamic key generation schemes is to use a mathematical algorithm to generate a new dynamic key i dk based on the previous key 1 i dk โˆ’ .…”
Section: Dynamic Key Generation Managementmentioning
confidence: 99%
“…The principle of dynamic key generation schemes is to use a mathematical algorithm to generate a new dynamic key i dk based on the previous key 1 i dk โˆ’ . One approach [17] uses a one-way function and cyclic-shifting techniques. The dynamic key system works by starting with an initial seed, then generating offline one time keys.…”
Section: Dynamic Key Generation Managementmentioning
confidence: 99%