Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 4975302, 11 pages
https://doi.org/10.1155/2017/4975302
Research Article

Dynamic Rule Encryption for Mobile Payment

School of Electrical Engineering & Informatics, Institut Teknologi Bandung, Jawa Barat, Indonesia

Correspondence should be addressed to Emir Husni; di.ca.bti.ee.kksl@insuhe

Received 11 October 2016; Revised 8 December 2016; Accepted 18 December 2016; Published 26 January 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Emir Husni. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. A. W. Wirawan and E. Oktivera, “Analysis on the implementation of digital marketing towards motorbike transport service case study: GO-JEK (online taxi motorbike) Jakarta, Indonesia,” in Proceedings of the 2nd International Conference on Information Technology Systems and Innovation (ICITSI '15), pp. 1–6, Bandung-Bali, Indonesia, November 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Budi and H. T. Sukmana, “Developing mobile-based academic information system: a case study at Islamic State University (UIN) Syarif Hidayatullah Jakarta,” in Proceedings of the 4th International Conference on Cyber and IT Service Management, Bandung, Indonesia, April 2016. View at Publisher · View at Google Scholar
  3. E. Husni and S. Purwantoro, “Shopping application system with Near Field Communication (NFC) based on Android,” in Proceedings of the International Conference on System Engineering and Technology (ICSET '12), pp. 1–6, IEEE, Bandung, Indonesia, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. E. Husni and A. Ariono, “Development of integrated mobile money system using Near Field Communication (NFC): smartphone and electronic data capture,” in Proceedings of the 8th International Conference on Telecommunication Systems Services and Applications (TSSA '14), pp. 1–6, IEEE, Bali, Indonesia, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. E. Husni, Kuspriyanto, N. Basjaruddin, T. Purboyo, S. Purwantoro, and H. Ubaya, “Efficient tag-to-tag Near Field Communication (NFC) protocol for secure mobile payment,” in Proceedings of the International Conference on Instrumentation, Communication, Information Technology and Biomedical Engineering (ICICI-BME '11), pp. 97–101, Bandung, Indonesia, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Husni, B. Leksono, and M. R. Rosa, “Digital signature for contract signing in service commerce,” in Proceedings of the International Conference on Technology, Informatics, Management, Engineering and Environment (TIME-E '15), pp. 111–116, IEEE, Samosir, Indonesia, September 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, “An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 9, no. 4, pp. 545–557, 2001. View at Publisher · View at Google Scholar · View at Scopus
  8. W. F. Ehrsam, S. M. Matyas, C. H. Meyer, and W. L. Tuchman, “A cryptographic key management scheme for implementing the Data Encryption Standard,” IBM Systems Journal, vol. 17, no. 2, pp. 106–125, 1978. View at Publisher · View at Google Scholar · View at Scopus
  9. H. B. Kazemian and L. Meng, “Neuro-fuzzy control for MPEG video transmission over bluetooth,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 36, no. 6, pp. 761–771, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Daemen and V. Rijmen, “The first 10 years of advanced encryption,” IEEE Security and Privacy, vol. 8, no. 6, pp. 72–74, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Tang and L. Zhang, “Adaptive bucket formation in encrypted databases,” in Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE-05 '05), pp. 116–119, Hong Kong, China, March-April 2005. View at Scopus
  12. N. Ben Hadjy Youssef, W. El Hadj Youssef, M. Machhout, R. Tourki, and K. Torki, “Instruction set extensions of AES algorithms for 32-bit processors,” in Proceedings of the 48th Annual IEEE International Carnahan Conference on Security Technology (ICCST '14), pp. 1–5, Rome, Italy, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Guosheng and W. Jian, “Security analysis and enhanced design of a dynamic block cipher,” China Communications, vol. 13, no. 1, pp. 150–160, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. A. J. Paul, P. Mythili, and J. K. Paulus, “Matrix based key generation to enhance key avalanche in advance encryption standard,” in Proceedings of the International Conference on VLSI, Communication & Instrumentation, pp. 31–34, Kottayam, India, April 2011.
  15. A. Jarrous and B. Pinkas, “Secure computation of functionalities based on Hamming distance and its application to computing document similarity,” International Journal of Applied Cryptography, vol. 3, no. 1, pp. 21–46, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. J. Bringer, H. Chabanne, and A. Patey, “SHADE: Secure HAmming DistancE computation from oblivious transfer,” in Financial Cryptography and Data Security, vol. 7862 of Lecture Notes in Computer Science, pp. 164–176, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  17. F. Guo, W. Susilo, and Y. Mu, “Distance-based encryption: how to embed fuzziness in biometric-based encryption,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 247–257, 2016. View at Google Scholar
  18. Lara-Niño, C. Andrés, M.-S. Miguel, and D.-P. Arturo, “An evaluation of AES and present ciphers for lightweight cryptography on smartphones,” in Proceedings of the 26th International Conference on Electronics, Communications and Computers (CONIELECOMP '16), pp. 87–93, Cholula, Mexico, February 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. J. K. Lee and J. Y. Lee, “Android programming techniques for improving performance,” in Proceedings of the 3rd International Conference on Awareness Science and Technology (iCAST '11), pp. 386–389, IEEE, Dalian, China, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Kwon, S. Lee, H. Yi et al., “Mantis: efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices,” IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2059–2072, 2015. View at Publisher · View at Google Scholar · View at Scopus