Research Article
Security Enhanced EMV-Based Mobile Payment Protocol
Table 5
Comparison of the number of messages with EMV.
| No. | Schemes | EPMAR | ES | ED | EC |
| 1 | SELECT | SELECT | SELECT | SELECT | 2 | GET PROCESSING OPTIONS | GET PROCESSING OPTIONS | GET PROCESSING OPTIONS | GET PROCESSING OPTIONS | 3 | GET DATA | GET DATA | GET DATA | GET DATA | 4 | READ RECORD | | | | 5 | VERIFY | | INTERNAL AUTHENTICATE | | 6 | READ RECORD | | | | 7 | READ RECORD | READ RECORD | READ RECORD | READ RECORD | 8 | GENERATE AC | GENERATE AC | GENERATE AC | GENERATE AC | 9 | EXTERNAL AUTHENTICATE | EXTERNAL AUTHENTICATE | EXTERNAL AUTHENTICATE | EXTERNAL AUTHENTICATE | 10 | GENERATE AC | GENERATE AC | GENERATE AC | GENERATE AC |
|
|