Abstract
In this article, we shall propose an efficient privacy management for mobile EC service applications. The EC service applications embrace the problem of both privacy and authentication. We consider the mobile station on the broad contest of networking, from the wireless devices through which network communication occur to the EC service application being communicated. The privacy problem is concerned with the task of preventing an opponent from extracting message information from the communication channel on EC service applications. On the other hand, mobile station requests EC service applications on visit network authentication deals with preventing the injection of false data into channel. We can avoid employing public key cryptography in the using privacy EC service applications phase since to keep the computation cost down.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
B. Pfitzmann. Breaking an efficient privacy management, Advances in Cryptology: Proc. EuroCrypt’94, Lecture Notes in Computer Science, 950, springer, Berlin, 1995, pp. 332–340.
C. Park, K. Itoh, and K. Kurosawa, Efficient privacy management and all /nothing election scheme, Advances in Cryptology: Proc. EuroCrypt’93, Lecture Notes in Computer Science, 765, Springer, Berlin, 1993, pp.248–259.
D. Chaum, Untraceable electronic mail, return address, and digital pseudonyms, Commun. ACM 24(2) (1981) 84–88.
D. Chaum, The dining cryptographers problem: unconditional sender and recipient untraceability, J. Cryptology 1 (1988) 65–75.
D. Naccache, and D. M. Raihi, Cryptographic Smart Cards, IEEE Micro, June 1996, pp. 14–25.
D. Samfat, R Molva, N, Asokan, Untraceability in mobile net works, in: Proc. First ACM Int. Conf. On Mobile Computing and Network, November 1995, pp. 26–36
ETSI: GSM recommendations: GSM 01.02-12.21, February, 1993, Release 92.
L. Jianwei, W. Yumin, A user authentication protocol for digital mobile communication network, in: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 1995, pp. 608–612.
M. Beller, Y. Yacobi, Fully-fledged two-way public key authentication and key agreement for low-cost terminals, Electronic Letters 29(11)(1993) 999–1101.
Whe Dar Lin, “EC Transactions Use Different Web-based Platforms,” Lecture Notes in Computer Science, 2003’
W. S. Juang, C. L. Lei, C.Y. Chang, Privacy management and authentication in mobile EC service applications, Computer communications, 22(1999), pp. 1502–1511.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, W.D. (2003). Mobile EC Service Applications by Privacy Management. In: Lovelle, J.M.C., Rodríguez, B.M.G., Gayo, J.E.L., del Puerto Paule Ruiz, M., Aguilar, L.J. (eds) Web Engineering. ICWE 2003. Lecture Notes in Computer Science, vol 2722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45068-8_47
Download citation
DOI: https://doi.org/10.1007/3-540-45068-8_47
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40522-1
Online ISBN: 978-3-540-45068-9
eBook Packages: Springer Book Archive