Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure.
Hajer BoujezzaHella Kaffel-Ben AyedLeïla Azouz SaïdanePublished in: IWCMC (2017)
Keyphrases
- information security
- transaction model
- concurrency control protocols
- database transactions
- locking protocol
- commit protocols
- deadlock free
- payment scheme
- concurrency control
- lightweight
- mobile payment
- mobile computing
- rfid systems
- countermeasures
- database
- trusted third party
- management system
- correctness criterion
- secure electronic
- location information
- real time database systems
- authentication protocol
- transaction management
- formal analysis
- snapshot isolation
- transaction processing
- distributed databases
- cloud computing
- cryptographic protocols
- security problems
- security mechanisms
- security issues
- update transactions
- smart card