Login / Signup
Secure M-commerce Transactions: A Third Party Based Signature Protocol.
Li-Sha He
Ning Zhang
Li-Rong He
Ian Rogers
Published in:
IAS (2007)
Keyphrases
</>
third party
trusted third party
mobile payment
blind signature
credit card
cryptographic protocols
covert channel
sensitive information
digital signature
blind signature scheme
authentication protocol
security protocols
electronic transactions
electronic voting
key distribution
provably secure
sensitive data
signature scheme
secure routing
scalar product
key management
lightweight
personal information
security analysis
electronic commerce
key agreement protocol
security requirements
concurrency control protocols
public key
encrypted data
reverse logistics
mobile services
mobile commerce
security properties
elliptic curve
transaction processing
mashup
private information
standard model
security issues
peer to peer
transaction management
business models
transaction model
private key
database
security mechanisms
ad hoc networks
privacy preserving
web services