In this paper we propose a new solution for mobile payments called Tap2 technology. To use it, users need only their NFC-enabled mobile phones and credentials implemented on their smart cards. An NFC device acts like a bridge between service providers and secure elements and the secure credentials (on the card) are never revealed. In this way, secure authentication can be obtained by means of anonymous credentials, implemented on a smart card to provide the functionality with minimal data disclosure. We propose to use zero-knowledge proofs based on attribute-based anonymous credentials to provide the security and privacy requirements in mobile payments. Other use cases include online shopping, easy payment, eGoverment proofs etc
Mobile devices are able to gather more and more functionalities use- ful to control people's daily l...
M.Sc. (Information Technology)With mobile payments and mobile wallets becoming more and more popular...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...
International audienceNFC transactions become very popular as they limit the time needed for a user ...
Mobile payment is widely used payment methodology adopted by the users in the recent days, Contactle...
Near Field Communication (NFC) mobile phonescan be used as payment devices and can emulate credit ca...
As mobile applications grow, securing these applications become an important factor for their succes...
A main challenge in mobile commerce is to make it possible for users to manage their transaction his...
The use of Mobile Devices for electronic payment has increased significantly in the last decade. Nea...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
International audienceThis paper first introduces a possible evolution of secure personal identifica...
International audienceThe emergence of the NFC (Near Field Communication) technology brings new capa...
Abstract Identity management is defined as the set of processes related to identity and access infor...
© 2019 IEEE. In this paper, we present a multi-factor stateful authentication system that uses Near ...
International audienceThe development of NFC-enabled smartphones has paved the way to new applicatio...
Mobile devices are able to gather more and more functionalities use- ful to control people's daily l...
M.Sc. (Information Technology)With mobile payments and mobile wallets becoming more and more popular...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...
International audienceNFC transactions become very popular as they limit the time needed for a user ...
Mobile payment is widely used payment methodology adopted by the users in the recent days, Contactle...
Near Field Communication (NFC) mobile phonescan be used as payment devices and can emulate credit ca...
As mobile applications grow, securing these applications become an important factor for their succes...
A main challenge in mobile commerce is to make it possible for users to manage their transaction his...
The use of Mobile Devices for electronic payment has increased significantly in the last decade. Nea...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
International audienceThis paper first introduces a possible evolution of secure personal identifica...
International audienceThe emergence of the NFC (Near Field Communication) technology brings new capa...
Abstract Identity management is defined as the set of processes related to identity and access infor...
© 2019 IEEE. In this paper, we present a multi-factor stateful authentication system that uses Near ...
International audienceThe development of NFC-enabled smartphones has paved the way to new applicatio...
Mobile devices are able to gather more and more functionalities use- ful to control people's daily l...
M.Sc. (Information Technology)With mobile payments and mobile wallets becoming more and more popular...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...