2018
DOI: 10.26599/tst.2018.9010031
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication Protocol for Mobile Payment

Abstract: With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an everincreasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention.However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the he… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…Authentication is especially important for network security [31,32] . In this paper, a PUF-based and cloudassisted lightweight authentication mechanism is proposed for multi-hop body area network.…”
Section: Resultsmentioning
confidence: 99%
“…Authentication is especially important for network security [31,32] . In this paper, a PUF-based and cloudassisted lightweight authentication mechanism is proposed for multi-hop body area network.…”
Section: Resultsmentioning
confidence: 99%
“…Fan et al [22] proposed a secure way of mobile payment using a Secure Mutual Authentication Protocol (SMAP) based on the Universal 2nd Factor (U2F) protocol. The mutual authentication was performed using an asymmetric cryptosystem.…”
Section: Related Work a Literature Review Related To Public Key mentioning
confidence: 99%
“…With the development of society, security issues have become the focus of attention, such as secure DHCPv6 mechanism, secure web, and secure authentication protocol for mobile payment, and so on [1][2][3][4][5] . The globalization of the modern Integrated Circuit (IC) industry has also raised increasing hardware security issues.…”
Section: Introductionmentioning
confidence: 99%