2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726503
|View full text |Cite
|
Sign up to set email alerts
|

Reliable OSPM schema for secure transaction using mobile agent in micropayment system

Abstract: Abstract-The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Dr. Chitra Kiran et al [19] have presented a previous study that looked at the implications of a secure micropayment system that used process-oriented structural design in a mobile network. To provide reliable and secure o ine transactions in mobile commerce, the prior system made extensive use of SPKI and hash chaining.…”
Section: Existing Workmentioning
confidence: 99%
“…Dr. Chitra Kiran et al [19] have presented a previous study that looked at the implications of a secure micropayment system that used process-oriented structural design in a mobile network. To provide reliable and secure o ine transactions in mobile commerce, the prior system made extensive use of SPKI and hash chaining.…”
Section: Existing Workmentioning
confidence: 99%
“…In [43] and [44] Chitra K and N. Kumar presented a reliable and secure micropayment mechanism. In paper [43] author designed a robust and secured micropayment system architecture for the wireless network.…”
Section: Related Workmentioning
confidence: 99%
“…For the security process, the author utilized the hash chaining approach, and simple public key cryptosystem which facilitates secure routing during m-transaction also offer an efficient method for digital coin system. Whereas in the paper [44], the authors presented an extended version of the previous study that addressed the security implications of a micropayment system using a mobile agent. As compared to the previous study, this paper has challenged to offer reliable and secure lightweight approach for offline payment method in m-commerce system.…”
Section: Related Workmentioning
confidence: 99%
“…Off-line NFC payments with electronic vouchers [39] " • • An anonymous fair off-line micro-payments scheme [40] " • • Robust m-commerce payment system [41] " • • Fair offline digital content transaction system [42] " • • Improved off-line electronic cash scheme [18] " • • User efficient recoverable off-line e-cash [43] " • • Off-line electronic cash scheme [44] " • • Reliable offline secure payment in mobile Commerce [45] " • • Providing security for e-wallet using e-cheque [46] " • • Efficient and practical fair buyer-anonymity exchange scheme [16] " • • Fully off-line secure credits for mobile micro-payments [8] " • • FRoDO-Fraud Resilient Device for Off-line micro-payments "…”
Section: Security Analysismentioning
confidence: 99%
“…Nowadays, many different off-line secure payment schemes have been proposed such as [39], [45], and [18]. These solutions try to guarantee basic security requirements such as double spending resiliency, coin forgery resiliency, and transaction anonymity.…”
Section: Data Breach Resiliencymentioning
confidence: 99%