Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Through the explosive growth of network technologies, electronic commercial businesses have made our lives easier and more convenient. The application of e-coupons is quite a novel issue but is becoming increasingly popular among electronic commercial businesses because the extensive use of e-coupons can help consumers to save money; however, the e-coupon has also brought security issues as attackers can obtain illegitimate benefits from imperfections of the design. Hence, the security of the e-coupon system has become important as well. In this paper, we propose a novel and complete chaotic maps-based authentication scheme for e-coupon systems. Security analysis shows that our scheme satisfies essential security and functionality requirements. Furthermore, performance analysis shows that the execution time of our scheme is efficient and suitable for practical implementation in real life. In other words, users such as shops and customers can use our e-coupon system conveniently and securely.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11–16), 1101–1109.
Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A.
Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51–63). California, U.S.A.
Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370–383). Torino, Italy.
Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542–552). New York, U.S.A.
Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086–1091.
Juniper Research, Mobile Coupons, 2008 Internet Resource, http://www.juniperresearch. (Date of access: July 2013).
Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283–293. CrossRef
Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38–52. CrossRef
Wikipedia, Wikipedia—The Free Encyclopedia, 2013 Internet Resource, https://en.wikipedia.org/wiki/Smart_card. (Date of access: July 2013).
Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi: 10.1002/dac.2448.
He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374. CrossRef
Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177–186. CrossRef
Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley. MATH
Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362–366). New York, U.S.A.
Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421–428), Ontario, Canada.
Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information.
Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131–138. CrossRef
- A Secure and Efficient Authentication Scheme for E-coupon Systems
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock