As the use of electronic transaction services in the Internet grows, there will be a definite need for an authentication method that is feasible in the customer's viewpoint. Mobile authentication is a strong alternative since the penetration of mobile phones grows in a similar way and they are becoming more and more personal as the mobile phone manufacturers develop new features to personalize their products. In this paper we introduce the concept of mobile authentication in electronic transaction services and the possibilities this enables for the ordinary customer. For the service providers, electronic services present a new way of gaining competitive advantage compared to the other service providers in the same area of business. This is ...
Instead of the traditional credit card payment system, we propose a new electronic payment system fo...
Abstract Trusted third-party (TTP) based transaction authentication is traditionally applied to auth...
Part 2: Mobile Authentication and Access ControlInternational audienceThe pervasive use of mobile ph...
As the use of electronic transaction services in the Internet grows, there will be a definite need f...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
A critical issue in the acceptance of wireless services is the authentication to these services. Wir...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
[[abstract]]Several years ago, handheld devices were regarded luxuries. But they are almost taking t...
Part 4: Data Protection and Identity ManagementInternational audienceMobile phones offer unique adva...
International audienceNFC transactions become very popular as they limit the time needed for a user ...
[[abstract]]Instead of the traditional credit card payment system, we propose a new electronic payme...
This paper presents a new scheme for online payment systems based on a mobile personal device and ex...
Authentication, or the proof of identity of one or both par-ties of a communication session, is ofte...
Instead of the traditional credit card payment system, we propose a new electronic payment system fo...
Abstract Trusted third-party (TTP) based transaction authentication is traditionally applied to auth...
Part 2: Mobile Authentication and Access ControlInternational audienceThe pervasive use of mobile ph...
As the use of electronic transaction services in the Internet grows, there will be a definite need f...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
A critical issue in the acceptance of wireless services is the authentication to these services. Wir...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
The widespread use of the Internet has contributed enormously towards the growth of e-commerce. Tech...
[[abstract]]Several years ago, handheld devices were regarded luxuries. But they are almost taking t...
Part 4: Data Protection and Identity ManagementInternational audienceMobile phones offer unique adva...
International audienceNFC transactions become very popular as they limit the time needed for a user ...
[[abstract]]Instead of the traditional credit card payment system, we propose a new electronic payme...
This paper presents a new scheme for online payment systems based on a mobile personal device and ex...
Authentication, or the proof of identity of one or both par-ties of a communication session, is ofte...
Instead of the traditional credit card payment system, we propose a new electronic payment system fo...
Abstract Trusted third-party (TTP) based transaction authentication is traditionally applied to auth...
Part 2: Mobile Authentication and Access ControlInternational audienceThe pervasive use of mobile ph...