G. Ma, Hyeong-chan Lee, J. Yi, Hyunsik Ki, D. Choi, Seunghun Jin
{"title":"Human verifiable authentication schemes geared to smart wallet applications","authors":"G. Ma, Hyeong-chan Lee, J. Yi, Hyunsik Ki, D. Choi, Seunghun Jin","doi":"10.1109/ICCE.2011.5722506","DOIUrl":null,"url":null,"abstract":"Smart wallet is a mobile enabled application and payment service provider to make convenient payments to any designated merchant over the Internet. In this paper, we propose human verifiable authentication schemes geared to smart wallet that prevent man-in-the-middle attack with neither a prior context nor a PKI. The Human Verifiable authentication scheme verifies a shared key for both parties to the transaction by human's sense such as visual and auditory. We also show thorough usability analysis of the proposed scheme with real implementation.","PeriodicalId":256368,"journal":{"name":"2011 IEEE International Conference on Consumer Electronics (ICCE)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Consumer Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE.2011.5722506","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Smart wallet is a mobile enabled application and payment service provider to make convenient payments to any designated merchant over the Internet. In this paper, we propose human verifiable authentication schemes geared to smart wallet that prevent man-in-the-middle attack with neither a prior context nor a PKI. The Human Verifiable authentication scheme verifies a shared key for both parties to the transaction by human's sense such as visual and auditory. We also show thorough usability analysis of the proposed scheme with real implementation.