79,563 research outputs found

    Secure transactions using mobile agents with TTP

    Get PDF
    Electronic commerce has pushed and benefited from the development of mobile agents technology. One of the reasons is electronic commerce needs remote searching and negotiating between one customer and a number of E-shops. Mobile agents can travel over the Intranet or Internet. Therefore, mobile agents can help the customer or E-shops with remote searching and negotiating. However, because of the heterogeneousness of the networks the mobile agents migrate to, security issues should be tackled with cautions. This paper presents a new secure electronic commerce protocol. The underlying transactions are accomplished with mobile agents. A trusted third party (in fact, a trusted authority) is involved in the protocol

    E-commerce through wireless devices

    Get PDF
    © 2001 IEEE. This paper presents the E-CWE (E-Commerce through Wireless dEvices) project. This project aims at investigating techniques and offering solutions that could support stationary and mobile users in secure wireless electronic commerce environments. In addition, the verification and demonstration of the suitability of software agents in these environments is discussed in this paper

    Security Measures in Mobile Commerce: Problems and Solutions

    Get PDF
    Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of cryptography for key generation, authentication, digital signature and digital certificate are discussed

    Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings

    Get PDF
    It is expect that mobile agents technology will bring significant benefits to electronic commerce. But security issues, especially threats from malicious hosts, become a great obstacle of widespread deployment of applications in electronic commerce based on mobile agents technology. Undetachable digital signature is a category of digital signatures to secure mobile agents against malicious hosts. An undetachable signature scheme by using encrypted functions from bilinear pairings was proposed in this paper. The security of this scheme base on the computational intractability of discrete logarithm problem and computational Diffe-Hellman problem on gap Diffle-Hellman group. Furthermore, the scheme satisfies all the requirements of a strong non-designated proxy signature i.e. verifiability, strong unforgeability, strong identifiability, strong undeniability and preventions of misuse. An undetachable threshold signature scheme that enable the customer to provide n mobile agents with ‘shares’ of the undetachable signature function is also provided. It is able to provide more reliability than classical undetachable signatures

    A Framework for e-Commerce Implementation: Nigeria a Case Study

    Get PDF
    The advent of the Internet has transformed the business environment in no small measure and has influenced the ways and manner businesses are transacted. This platform has brought about enhanced electronic and mobile business transactions. However, the advent of e-Commerce, m-Commerce or i-Commerce has placed a premium on the participating organisations or nations in terms of provision of the basic infrastructure for a secure, seamless and trusted business environment through the electronic media. This paper presents an exploratory study of the prospects of e-Commerce implementation and the factors inhibiting its growth. A set of questionnaire was designed, administered and analysed based on political, economic, social and technological (PEST) analysis. The PEST analysis is to help review the current practices with a view to developing a framework for Nigeria and other developing nations in Africa. Findings revealed that the Automatic Teller Machine (ATM) is the most widely used medium of e-Payment in Nigeria, which is not very suitable for e-Commerce implementation. Similarly, the Internet penetration is still abysmally low and is one of the major threats to e-Commerce implementation. However, the nascent democracy enjoyed in Nigeria is faced with some teething problems, but it promised with time, relative political stability, direct foreign investment, improved economical atmosphere, improved social services and technological development more than ever witnessed in the country. Therefore, a viable framework for Nigeria and Africa would be such that involves the private and public partnership (PPP). This consortium is expected to provide the platform for access to the Internet and popularize the use of e-Payment among other things

    Secure electronic commerce with mobile agents

    Get PDF
    Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile environment. For example, a server may compromise the mobile agent and try to obtain private information of the client. A solution to tackle this issue has been proposed. However, the existing solution is implemented using RSA signatures that result in long signatures and heavy workloads for the mobile agent. Mobile agents will migrate from the client to a server and from one server to other servers in order to accomplish the client?s transaction plan. Therefore, it will be interesting to re-tackle this issue. We present a new scheme for secure transactions using mobile agents in potentially hostile environments. This transaction scheme is implemented by using a new undetachable signature scheme. The new undetachable signature protocol utilizes short signatures, which is desirable for low-bandwidth and efficient mobile communications

    Secure Authentication Protocols for Mobile Commerce Transactions

    Get PDF
    [[abstract]]Several years ago, handheld devices were regarded luxuries. But they are almost taking the place of the traditional phones. It is because of the speedy development of mobile and wireless communication technologies. Nowadays, the mobile station plays an important role in most people?s daily life. Furthermore, the explosion of the Internet has led to an electronic commerce environment such that people can conduct most transactions electronically. To improve the convenience and portability of electronic commerce, the mobile commerce system is proposed. In 2003, Lam et al. proposed a lightweight security mechanism for mobile commerce. Unfortunately, we find that there exists a security weakness in their method. Hence, we provide improvements on their proposed authentication protocol to make it secure. Besides, we propose a new authentication protocol for the mobile commerce transactions without adopting the public key cryptosystem

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems

    Account Based Mobile Payment by Diffie-Hellman Key Exchange Protocol

    Get PDF
    With the development on techniques of mobile communication, the daily activities benefit from these techniques more than ever. In order to make living more convenient, the mobile payment has been brought up in recent years. The consideration for carrying out the mobile payment is very difference from that in the wired electronics payment scheme because of the characteristics of mobile device. In this article we develop a mobile payment scheme that is based on reducing the operation of the device, and furthermore achieves the demands of security. It can create the session key for each transaction by means of using the “Diffie-Hellman key exchange” protocol. The use of the Message Authentication Code (MAC) can achieve the integrity of electronic commerce. Both of them do not need a large number of operations and complex algorithm so it can achieve the purposes of this investigation: a secure, convenient and light-computation scheme for mobile payment

    Design of secure mobile payment protocols for restricted connectivity scenarios

    Get PDF
    The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version
    corecore