2017 Electronics 2017
DOI: 10.1109/electronics.2017.7995226
|View full text |Cite
|
Sign up to set email alerts
|

Computational resources for mobile E-wallet system with observers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 1 publication
0
6
0
1
Order By: Relevance
“…A hardware implementation of CHL e-Cash was developed for mobile devices utilizing the ARM TrustZone trusted computing environment [14]. Use of hardware electronic wallets in cell phones or mobile devices for electronic transactions is described by Sakalauskas [15].…”
Section: Electronic Cashmentioning
confidence: 99%
“…A hardware implementation of CHL e-Cash was developed for mobile devices utilizing the ARM TrustZone trusted computing environment [14]. Use of hardware electronic wallets in cell phones or mobile devices for electronic transactions is described by Sakalauskas [15].…”
Section: Electronic Cashmentioning
confidence: 99%
“…The features of the final version of the segmented images are extracted and it is compared with the already stored feature details of the reference data, when the result of comparison is greater than a threshold, a decision is made on whether the given note is fake or real. Sakalauskas [2] has proposed an effective realization for an e-wallet system, the proposed system uses Elgamal Asymmetric Encryption Scheme for digital signatures generation and verification. SHA 256 algorithm is used for defining Payment parameters.…”
Section: Related Workmentioning
confidence: 99%
“…In the system [2], the author demonstrates the security using two parts of electronic circuitry; one part is a small and elongated magnet which is placed in the wallet. The other part is the electronic circuitry and audio producing device in which the circuit activating switch is held open as long as the wallet with its magnet is in proximity to the second part.…”
Section: Traditional Wallet Security and Fake Currency Detectionmentioning
confidence: 99%
“…Since the observer in this system is the chip implemented in user's device, it is necessary to supply the chip with proper cryptographic functions. In [21], we suggested using physical unclonable functions (PUFs, [14]) as a better way of ensuring the suitability of cryptographic functions and the security of e-money system. It was also mentioned in [21] that PUFs allow user to extract a unique unclonable code (UUC) for the chip and to create a unique cryptographic key.…”
Section: Transferabilitymentioning
confidence: 99%
“…In [21], we suggested using physical unclonable functions (PUFs, [14]) as a better way of ensuring the suitability of cryptographic functions and the security of e-money system. It was also mentioned in [21] that PUFs allow user to extract a unique unclonable code (UUC) for the chip and to create a unique cryptographic key. Thus, in this paper, we assume that observer chips are supplied with PUFs and the UUC is used as an identifier of the owner of the chip.…”
Section: Transferabilitymentioning
confidence: 99%