2,917 research outputs found
A Lightweight Security Protocol for NFC-based Mobile Payments
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to securely establish mobile payment transactions over the Near-Field Communication (NFC) radio interface. The proposed solution is very lightweight one; it uses symmetric cryptographic primitives on devices having memory and CPU resources limitations. We show that our approach maintains the security of NFC communications and we further demonstrate that our solution is simple, scalable, cost-effective, and incurs minimal computational processing overheads
Performance Analysis of SAP-NFC Protocol
The operations cost of authentication session is considered as strict indicator to evaluate the authentication protocols side by side with the security requirements achievements in the Near Field Communication (NFC) technology. The secure authentication protocol for the NFC mobile payment systems (SAP-NFC) one of the recent authentication protocols that have proposed to achieve high level of security features such as the fully mutual authentication, anonymity and untraceability. Moreover, the SAP-NFC protocol can prevent the current security attacks. This paper, analyzes the performance of the SAP-NFC protocol comparing with the other recent NFC mobile payment protocols in the NFC devices that are included in the system. The performance analysis has illustrated that the SAP-NFC protocol not only supports strong security features, but also offers low cost in term of amount of computations
Face Recognition for Payment and Information Sharing
We have seen the emergence of various payment and information sharing methods with the rapid digitization of such services. Payment methods like NFC, Credit/Debit card, and QR code-based have become very common. These methods were intended to provide secure, safe and faster transactions. Although these have succeeded in their intentions up to some extent, there are various factors that are posing problems like confusion, time consumption, security threat, fraud, and theft. When it comes to sharing contact information and social media handles, visiting cards are still preferred but this is not the most reliable method as one either tends to lose these cards or has to store this information manually on their phone. This paper provides a comprehensive survey of the various available methods for making mobile payments and sending contact details as well as the challenges faced. Furthermore, we discuss and compare alternative available technologies like face recognition that can be implemented
Encryption – use and control in E-commerce
The author describes how cryptography can be used to address modern business requirements such as identity protection, secure web access and digital signatures. Article by Robert Bond (Head of Innovation & Technology Group, Hobson Audley and Fellow of SALS). Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London
- …