{"title":"Design of a PKI-Based Secure Architecture for Mobile E-Commerce","authors":"Wu Yanyan","doi":"10.1109/ICIC.2010.31","DOIUrl":null,"url":null,"abstract":"The development of mobile devices and the public key infrastructure???PKI???have improved the rapid development of mobile e-commerce. However, there exits some challenges such as limit computing capacity for PKI-based secure transactions. This paper presents a new system architecture which includes client, mobile operator, service provider, certificate authority and so on. On this basis, the protocols for authentication and key exchange that is suitable for the mobile e-commerce environment are designed to support some applications.","PeriodicalId":176212,"journal":{"name":"2010 Third International Conference on Information and Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Conference on Information and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC.2010.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The development of mobile devices and the public key infrastructure???PKI???have improved the rapid development of mobile e-commerce. However, there exits some challenges such as limit computing capacity for PKI-based secure transactions. This paper presents a new system architecture which includes client, mobile operator, service provider, certificate authority and so on. On this basis, the protocols for authentication and key exchange that is suitable for the mobile e-commerce environment are designed to support some applications.