The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objective: In the modern era, smart phones and iPhones are the most dominating gadgets among human beings. The tremendous number of mobile users along with the omnipresent nature of mobile devices has created an immense market for mobile commerce. But, for that m-commerce to be recognized to 100%, users have to belief the security measures of m-commerce generally and m-payment especially. In other words, the growth of wireless networks and massive usage of mobile devices have increased the concerns about performance and security of mobile payment systems. The two critical and challenging features of any payment protocol are security and privacy. Method: This paper proposes a novel secured authentication protocol for mobile banking which would overcome the two critical features of any mobile payment transactions. This proposed protocol combines both asymmetric and symmetric key cryptographic techniques. Findings: Compared to few existing authentication protocols based on either ECC or RSA, the proposed authentication protocol over resource-constrained mobile devices serves better in terms of privacy, security and computation. Novelty: This paper proposes a novel secured authentication protocol which combines both asymmetric and symmetric key cryptographic techniques (HECC and AES).

Keywords

Authentication, ECC, HECC, Privacy, RSA, Security.
User