2015
DOI: 10.1007/978-981-10-0251-9_35
|View full text |Cite
|
Sign up to set email alerts
|

Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-Verifier for Digital Goods Providers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…However, Alzahrani et al 41 proved that an attacker computes the session key after executing the stolen smart card attack and eavesdropping attack. In the last decade, many other protocols have been proposed to meet all security requirements, [42][43][44][45][46][47] but these protocols were unable to provide all security aspects of IoT. Recently, Ghani et al 3 proposed a lightweight authentication protocol to resolve the weaknesses of the previous works.…”
Section: Related Workmentioning
confidence: 99%
“…However, Alzahrani et al 41 proved that an attacker computes the session key after executing the stolen smart card attack and eavesdropping attack. In the last decade, many other protocols have been proposed to meet all security requirements, [42][43][44][45][46][47] but these protocols were unable to provide all security aspects of IoT. Recently, Ghani et al 3 proposed a lightweight authentication protocol to resolve the weaknesses of the previous works.…”
Section: Related Workmentioning
confidence: 99%
“…Strand space model is a widely known and accepted formal method for protocol verification and have been recently used it for protocol correctness. In reference with Fabrega et al, we list some terminologies used in the analysis.…”
Section: Preliminariesmentioning
confidence: 99%
“…Sureshkumar et al [10] introduced two gateway based payment scheme, and then Sureshkumar et al [11] also proposed an enhanced lightweight protocol based on two gateways using dynamic identity. They claim that their scheme satisfies security requirement for mobile payment such as unlinkability, accountability and untraceability, and reduces computational complexity than other related works.…”
Section: Introductionmentioning
confidence: 99%