Vulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment scheme
dc.contributor.author | Kim, Minho | |
dc.contributor.author | Koç, Çetin Kaya | |
dc.date.accessioned | 2020-11-21T15:55:44Z | |
dc.date.available | 2020-11-21T15:55:44Z | |
dc.date.issued | 2007 | en_US |
dc.department | İstanbul Ticaret Üniversitesi | en_US |
dc.description.abstract | Rivest and Shamir presented two simple micropayment schemes, "PayWord" and "MicroMint," for making small purchases over the Internet [14]. Recently, Adachi et al. have pointed out that the PayWord scheme has two security problems, and proposed a new micropayment scheme to overcome these problems [1]. Nevertheless, we show that their protocol is still vulnerable to impersonation and replay attacks. | en_US |
dc.identifier.endpage | 239 | en_US |
dc.identifier.issn | 1816353X | |
dc.identifier.issue | 2 | en_US |
dc.identifier.scopus | 2-s2.0-77951135883 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 235 | en_US |
dc.identifier.uri | https://hdl.handle.net/11467/4042 | |
dc.identifier.volume | 4 | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | International Journal of Network Security | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Electronic commerce | en_US |
dc.subject | Impersonation | en_US |
dc.subject | Micropayment | en_US |
dc.subject | Payword | en_US |
dc.subject | Replay attack | en_US |
dc.title | Vulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment scheme | en_US |
dc.type | Article | en_US |