2014
DOI: 10.1504/ijcse.2014.060718
|View full text |Cite
|
Sign up to set email alerts
|

Secure mobile payment framework based on UICC with formal verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…C validates the certificate (AS9) received from Client C as listed in (Ahamad et al 2014). If the verification is successful then, Hence, from (1) to (4), Then, Step 3 was: C hashes the OI which it has received from POS, adds PI, TID, Amt, Cert POS , POS ID , T C , N C and sends MS1 to Issuer Bank (IB).…”
Section: Formal Verification Of Sppmc Protocol Using Ban Logicmentioning
confidence: 99%
See 2 more Smart Citations
“…C validates the certificate (AS9) received from Client C as listed in (Ahamad et al 2014). If the verification is successful then, Hence, from (1) to (4), Then, Step 3 was: C hashes the OI which it has received from POS, adds PI, TID, Amt, Cert POS , POS ID , T C , N C and sends MS1 to Issuer Bank (IB).…”
Section: Formal Verification Of Sppmc Protocol Using Ban Logicmentioning
confidence: 99%
“…Our proposed framework adopts the procedure proposed in Ahamad et al (2014) for the personalization; so there are four certificates at the client side which are issued by TSM (which is also a CA). Before describing the full authentication and transaction protocol, Table 1 shows all the major mathematical notations used in this paper along with their meanings.…”
Section: Uicc Personalizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The main beliefs that participate in the protocol constantly change with the message. Finally, we check whether the protocol can achieve the desired objectives [11] .…”
Section: Terms and Rules Of Ban Logicmentioning
confidence: 99%
“…Appendix B. Research methodology and methods Kim et al, 2010;Moroni et al, 2015;Silic et al, 2014;Zhao andKurnia, 2014 Focus groups 3 Di Pietro et al, 2015; Ahamad et al, 2014;Almuairfi et al, 2014;Ammayappan, 2015;Bottoni and Deni, 2007;Clarke, 2008;Conti et al, 2009;Fan and Huang, 2010;Fun et al, 2008;Godbole and Pais, 2008;Gold et al, 2015;Grønli et al, 2015;Hassinen et al, 2008;Hwang et al, 2007;Jiang et al, 2009;Kadambi et al, 2009;Konidala et al, 2012;Kousaridas et al, 2008;Lee et al, 2007;Lei et al, 2009;Li et al, 2012;Lin et al, 2008;Luo et al, 2016;Martínez-Peláez et al, 2015;Massoth and Bingel, 2009;Munch-Ellingsen et al, 2015;Ou and Ou, 2009;Pasquet et al, 2008;Popescu, 2009;Rahimian and Habibi, 2008;Sung et al, 2015;Wang et al, 2008;Yang and Chang, 2012;Yang and Lin, 2016;…”
mentioning
confidence: 99%