{"title":"移动电子商务安全架构","authors":"Zhuo Wang, Ran Hu, Jianfeng Xu","doi":"10.1109/GRC.2009.5255000","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce an M-Commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce Communications Issues. The architecture meets the security need of data transmitting over wireless net. It certifies the feasibility of model that satisfies the security criterion of Mobile E-commerce Communication.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Mobile E-commerce security architecture\",\"authors\":\"Zhuo Wang, Ran Hu, Jianfeng Xu\",\"doi\":\"10.1109/GRC.2009.5255000\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduce an M-Commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce Communications Issues. The architecture meets the security need of data transmitting over wireless net. It certifies the feasibility of model that satisfies the security criterion of Mobile E-commerce Communication.\",\"PeriodicalId\":388774,\"journal\":{\"name\":\"2009 IEEE International Conference on Granular Computing\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Granular Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GRC.2009.5255000\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Granular Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GRC.2009.5255000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we introduce an M-Commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce Communications Issues. The architecture meets the security need of data transmitting over wireless net. It certifies the feasibility of model that satisfies the security criterion of Mobile E-commerce Communication.