1 of the Thesis………………………………………………………….20 Research Plan of the

1 Chapter 1Introduction 1 Mobile Commerce…………………………………………………………………….

15 Mobile Payment………………………………………………………………………..16 Security and Limitations of Mobile Payment Systems…………………………. 18 Limitations of Wireless Environments………………………………………………

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

18 characteristics of Wireless Network…………………………………………………..18 Security vs. Transaction Performance of Mobile Payment Systems………………19 Research Motivations of the Thesis………………………..

….

….

….

……

…..

….

19 Research Question of the Thesis…………………………………………..

….

……

….20 Research Plan of the Thesis………………………………………………………..

21 Objectives of the Thesis…………………………………………………………. 22 Organization of the Thesis………………………………………………………..22 2. Chapter 2.

Overview of mobile Payment………………………………………………………………..23 Requirements for a Practical and Secure Mobile Payment System ……………..23 General Electronic Payment Model…………………………………………………24 Electronic Payment Systems………………………………………………………26 Account-Based Electronic Payment Systems…………………………………….

.26 Token-Based Electronic Payment Systems 27 Enabling Mobile Payment 29 Proxy-Based Framework 30 Agent-Based Framework 32 Non Proxy-Based Framework 35 Comparison of Existing Frameworks for Mobile Payment……………………… 39 Integrated Mobile Payment Framework43Securing Transfer of Account information During Payment transactions……………………………………………………………….…40 Rubin et al.’s Scheme…………,,,,,,,,,,,,,………………………………………….

…47 Li et al.’s Scheme…………………………………………………………………….44 A Possible Solution to Secure Account Information Transfer 44 Summary………………. 453. Chapter 3 Formal Mobile Payment Model 51a. Electronic Payment 46b.

i. Electronic Payment System 46ii. Engaging Parties 47iii. Communication Environment 49iv. Payment Token 50v.

Payment Information 50vi. Payment Transaction 51vii. Goals of Engaging Parties for Payment Transactions . .………………………………………………… 52viii. Party’s Requirements for Payment Transactions 53ix.

Transaction Security 56x. Trust Relationships among Engaging Parties 57xi. Transaction Performance 57xii. Practical and Secure Mobile Payment System 59xiii. Wireless vs.

Fixed Environments 59xiv. Cryptographic Operations 59xv. Symmetric vs. Asymmetric Cryptography for Payment Transactions………………………………………………..61c.

Fixed-network Payment Protocols in Wireless Environments…… 62d. Analyzing a Payment System Based on The Proposed Model.. …62e.

3.4 Summary……………………………………………………634 Chapter 4A Framework for Practical and Secure Mobile Payment 64a. Evaluation of Existing Frameworks 64i. Agent-Based Framework 66ii. Details of the Proposed Framework 67iii. Comparing the Proposed Framework to Existing Frame- works 69b.

Discussions 72i. Trust Relationships among Engaging Parties 72ii. Transaction Security Properties 73iii. Client Privacy 75iv.

Computational Load 75v. Compatibility with Existing Payment Infrastructure . . .

… 76c. Summary 765 Chapter 5Fundamental Concepts Of Our Mobile Transaction Processing System and security……………………………………………………………..78a. Enhancing Security of Symmetric Cryptography 78b. The Proposed Cryptographic Technique 79c.

Notations 80d. KSLv1 Protocol 81i. Initial Assumptions 82ii. Key Generation Techniques 82e.

Analysis and Discussions 83i. Goals of Engaging Parties for Payment Transactions . . . ………………………………………………….

.83ii. Transaction Security Properties 84iii. Failure Recovery 84iv.

Trust Relationships among Engaging Parties 85f. Performance Analysis………………………………………………………………85Applying KSLv1 and KSLv2 to the Proposed Mobile Payment Framework…………………………………………………………..89g.

Summary 906 Validation of KSLv1 Protocol 92a. Environment Settings 92b. Chosen Cryptographic Operations 129System Design 94i.

KSL Wallet Design 97ii. Merchant Design 97iii. Payment Gateway Design 99c. Implementation 100i.

Merchant Registration 100ii. Making Payment 102d. Results and Discussions 104i.

Transaction Time 105ii. Storing Keys 106iii. Application Size 107e. Summary 1077. ChapterCurrent Stage of the Implementation of the Prototype of Mobile Transaction Processing System…………..

………………………………………………….108Kungpisdan et al.’s Logic………………………………………………. 112f. Accountability vs.

Protocols for Wireless Networks 112g. The Proposed Accountability Logic 116h. Analysis of the Proposed SET Framework on Accountability.

. Goals of the Analysis 120 Initial Assumptions. 129 Party’s Requirements for Payment Transactions of iKP Protocol ……………….

.129 Summary…………………. 129 Chapter 8.

Evaluates The Research Results …………..………131 The Proposed Micropayment Protocol 135 Overview of the Proposed Protocol 136 Initial Assumptions …………………………………………………………………136 Setup Protocol………………….

. 136 Payment Initialization Protocol 140 Payment Protocol…………….. 140 Extra Credit Request Protocol 140 Coupon Cancellation Protocol 142 Coin Return Protocol 143 Extending the Proposed Protocol to Postpaid Micropayment . ………………144 Payment Initialization Protocol 144 Payment Clearing Protocol 144 Analysis and Discussions 145 Transaction Security Properties 145 Dispute Resolution………….. 146 Private Information …………………………………………………………………146 Secret Keys……………………… 147 Trust Relationships among Engaging Parties 147 Performance Analysis 147 Summary……………… 153Bibliography………………………………………………………… 154 B Publications……………………………………………………… 159

x

Hi!
I'm Gerard!

Would you like to get a custom essay? How about receiving a customized one?

Check it out