A Secure Authentication Infrastructure for Mobile Users

A Secure Authentication Infrastructure for Mobile Users

Gregor V. Bochmann, Eric Zhen Zhang
Copyright: © 2005 |Pages: 25
ISBN13: 9781591403456|ISBN10: 1591403456|ISBN13 Softcover: 9781591403463|EISBN13: 9781591403470
DOI: 10.4018/978-1-59140-345-6.ch004
Cite Chapter Cite Chapter

MLA

Bochmann, Gregor V., and Eric Zhen Zhang. "A Secure Authentication Infrastructure for Mobile Users." Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, et al., IGI Global, 2005, pp. 56-80. https://doi.org/10.4018/978-1-59140-345-6.ch004

APA

Bochmann, G. V. & Zhang, E. Z. (2005). A Secure Authentication Infrastructure for Mobile Users. In W. Hu, C. Lee, & W. Kou (Eds.), Advances in Security and Payment Methods for Mobile Commerce (pp. 56-80). IGI Global. https://doi.org/10.4018/978-1-59140-345-6.ch004

Chicago

Bochmann, Gregor V., and Eric Zhen Zhang. "A Secure Authentication Infrastructure for Mobile Users." In Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, 56-80. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-345-6.ch004

Export Reference

Mendeley
Favorite

Abstract

The requirements for an authentication infrastructure for electronic commerce are explained by identifying the partners involved in e-commerce transactions and the trust relationships required. Related security requirements are also explained, such as authentication, access rights, payment credentials, anonymity (in certain cases), and privacy and integrity of message exchanges. Then several general authentication schemes and specific protocols are reviewed and their suitability for mobile users is discussed. Finally, an improved authentication protocol is presented which can provide trust relationships for mobile e-commerce users. Its analysis and comparison with other proposed authentication protocols indicate that it is a good candidate for use in the context of mobile e-commerce.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.