Vulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment scheme

dc.contributor.authorKim, Minho
dc.contributor.authorKoç, Çetin Kaya
dc.date.accessioned2020-11-21T15:55:44Z
dc.date.available2020-11-21T15:55:44Z
dc.date.issued2007en_US
dc.departmentİstanbul Ticaret Üniversitesien_US
dc.description.abstractRivest and Shamir presented two simple micropayment schemes, "PayWord" and "MicroMint," for making small purchases over the Internet [14]. Recently, Adachi et al. have pointed out that the PayWord scheme has two security problems, and proposed a new micropayment scheme to overcome these problems [1]. Nevertheless, we show that their protocol is still vulnerable to impersonation and replay attacks.en_US
dc.identifier.endpage239en_US
dc.identifier.issn1816353X
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-77951135883en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage235en_US
dc.identifier.urihttps://hdl.handle.net/11467/4042
dc.identifier.volume4en_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.relation.ispartofInternational Journal of Network Securityen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectElectronic commerceen_US
dc.subjectImpersonationen_US
dc.subjectMicropaymenten_US
dc.subjectPayworden_US
dc.subjectReplay attacken_US
dc.titleVulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment schemeen_US
dc.typeArticleen_US

Dosyalar