Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 103136, 8 pages
http://dx.doi.org/10.1155/2014/103136
Research Article

Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

1School of Electronic Information Engineering, Tianjin University, Tianjin 300072, China
2Department of Computer Science, Loughborough University, Loughborough LE11 3TU, UK

Received 6 June 2014; Accepted 13 August 2014; Published 28 December 2014

Academic Editor: He Huang

Copyright © 2014 Jiachen Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Lin, H.-Y. Chen, Y. Fang, J.-Y. Jeng, and F.-S. Lu, “A secure mobile electronic payment architecture platform for wireless mobile networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 7, pp. 2705–2713, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. J.-H. Yang and C.-C. Chang, “A low computational-cost electronic payment scheme for mobile commerce with large-scale mobile users,” Wireless Personal Communications, vol. 63, no. 1, pp. 83–99, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. Y.-J. Chen, W.-C. Hsieh, W. Chen, and Z.-Y. Meng, “An efficient and secure micro-payment protocol for mobile commerce,” in Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI '05), pp. 7–12, Orlando, Fla, USA, July 2005. View at Scopus
  4. D. He, Y. Chen, and J. Chen, “An id-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments,” Arabian Journal for Science and Engineering, vol. 38, no. 8, pp. 2055–2061, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. X. Zhu, X. Shang, C. Wang, and R. Zhang, “MOTP: an identity authentication scheme for M-commerce,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 146–150, 2013. View at Google Scholar · View at Scopus
  6. W.-J. Tsaur, “Several security schemes constructed using ECC-based self-certified public key cryptosystems,” Applied Mathematics and Computation, vol. 168, no. 1, pp. 447–464, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. Y.-P. Liao and C.-M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generation Computer Systems, vol. 29, no. 3, pp. 886–900, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. J.-H. Yang, Y.-F. Chang, and Y.-H. Chen, “An efficient authenticated encryption scheme based on ECC and its application for electronic payment,” Information Technology and Control, vol. 42, no. 4, pp. 315–324, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Zakerolhosseini and M. Nikooghadam, “Secure transmission of mobile agent in dynamic distributed environments,” Wireless Personal Communications, vol. 70, no. 2, pp. 641–656, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Li, Y. Zhuang, B. Zhang, and C. Zhang, “Novel frequency hopping sequences generator based on AES algorithm,” Transactions of Tianjin University, vol. 16, no. 1, pp. 22–27, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. C.-H. Chou, K.-Y. Tsai, T.-C. Wu, and K.-H. Yeh, “Efficient and secure three-party authenticated key exchange protocol for mobile environments,” Journal of Zhejiang University: Science C, vol. 14, no. 5, pp. 347–355, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Chatterjee, A. K. Das, and J. K. Sing, “An enhanced access control scheme in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1-2, pp. 121–149, 2014. View at Google Scholar · View at Scopus
  13. J. Wei, W. Liu, and X. Hu, “Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture,” Wireless Personal Communications, vol. 77, no. 3, pp. 2255–2269, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Wen, D. Guo, and X. Li, “Cryptanalysis of a new dynamic ID-based user authentication scheme to resist smart-card-theft attack,” Applied Mathematics and Information Sciences, vol. 8, no. 4, pp. 1855–1858, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. S. U. Rehman, K. W. Sowerby, and C. Coghill, “Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 591–601, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Choi, D. Lee, J. Kim et al., “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 14, no. 6, pp. 10081–10106, 2014. View at Publisher · View at Google Scholar
  17. W.-B. Hsieh and J.-S. Leu, “Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks,” Wireless Communications and Mobile Computing, vol. 14, no. 10, pp. 995–1006, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. W.-J. Liu, C. Liu, H.-B. Wang, J.-F. Liu, F. Wang, and X.-M. Yuan, “Secure quantum private comparison of equality based on asymmetric W state,” International Journal of Theoretical Physics, vol. 53, no. 6, pp. 1804–1813, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. C.-Y. Lin and T. Hwang, “CNOT extraction attack on ‘quantum asymmetric cryptography with symmetric keys’,” Science China: Physics, Mechanics and Astronomy, vol. 57, no. 5, pp. 1001–1003, 2014. View at Publisher · View at Google Scholar · View at Scopus