- Page 1: A NEW ARCHITECTURE FOR SECURE TWO-P
- Page 5 and 6: List of Appended Papers Parts of th
- Page 7 and 8: Contents Title Page Approval/Signat
- Page 9 and 10: 4.2.2 Server Architecture .........
- Page 11 and 12: List of Figures 2.1 The major mobil
- Page 13 and 14: in becoming a successful mobile ser
- Page 15 and 16: 1.3 Problem Statement The objective
- Page 17 and 18: limited environment of mobile devic
- Page 19 and 20: the Record Management System (RMS).
- Page 21 and 22: are presented. Chapter 7 This chapt
- Page 23 and 24: can provide more convenience, mobil
- Page 25 and 26: GSM is limited in its low data tran
- Page 27 and 28: Code Division Multiple Access (W-CD
- Page 29 and 30: as it does not provide a secured en
- Page 31 and 32: 2.3.1 Mobile Payment Overview A mob
- Page 33 and 34: Figure 2.1: The major mobile paymen
- Page 35 and 36: 2.4.1 Mobile Devices’ Overview A
- Page 37 and 38: ian OS are developed using standard
- Page 39 and 40: Linux Linux is a Unix-like computer
- Page 41 and 42: included in the iPhone SDK agreemen
- Page 43 and 44: 2. a profile which is a set of APIs
- Page 45 and 46: MIDP occupies the layer above CLDC,
- Page 47 and 48: 2.6.1 Authentication: Definition In
- Page 49 and 50: 2.6.3 Multi-factor Authentication F
- Page 51 and 52: A cryptography algorithm is a mathe
- Page 53 and 54:
Advanced Encryption Standard The Ad
- Page 55 and 56:
The AES algorithm is required to be
- Page 57 and 58:
on a paper document (Stallings, 200
- Page 59 and 60:
Table 2.2: Applications for DSA, RS
- Page 61 and 62:
suitable for securing mobile bankin
- Page 63 and 64:
2.7.4 A Comparison of Symmetric-key
- Page 65 and 66:
chitecture to provide comprehensive
- Page 67 and 68:
mum base memory of 192 KB and a 16/
- Page 69 and 70:
produces software components that c
- Page 71 and 72:
the financial sector and the client
- Page 73 and 74:
3.1.4 Application Layer The current
- Page 75 and 76:
The information in the table is exp
- Page 77 and 78:
Figure 3.5: An Onion Layer Framewor
- Page 79 and 80:
Illustrated in Figure 3.6, the X-ax
- Page 81 and 82:
As illustrated in Figure 3.6, the r
- Page 83 and 84:
mobile devices, the employment of E
- Page 85 and 86:
• Something you are or do: This m
- Page 87 and 88:
Chapter 4 System Design This chapte
- Page 89 and 90:
• DVeri f y: Denotes the verifica
- Page 91 and 92:
the application layer, it focuses o
- Page 93 and 94:
crypter were the same sender (Davis
- Page 95 and 96:
Encryption Layer SA2pMP utilizes a
- Page 97 and 98:
control. 4.1.5 Distributed Transact
- Page 99 and 100:
log server is maintained by the mob
- Page 101 and 102:
nature does not share anything secr
- Page 103 and 104:
is transferred to the authenticatio
- Page 105 and 106:
and government systems (Lam et al.,
- Page 107 and 108:
Figure 4.7: The mobile banking modu
- Page 109 and 110:
key and a public key. It then distr
- Page 111 and 112:
the encryption and decryption publi
- Page 113 and 114:
Chapter 5 System Simulation In this
- Page 115 and 116:
The simulation system was developed
- Page 117 and 118:
5.2.1 Business Work Flow The work f
- Page 119 and 120:
described as follows: 1. To initiat
- Page 121 and 122:
which is used to compare with the d
- Page 123 and 124:
Figure 5.2: The variables’ transf
- Page 125 and 126:
ackground on the cryptography algor
- Page 127 and 128:
The Criteria of Nielsen (1995) Base
- Page 129 and 130:
focused on the delay caused by prot
- Page 131 and 132:
Figure 5.4: The time delay on Sony
- Page 133 and 134:
caused by verifying operation on th
- Page 135 and 136:
although some visual or multi-modal
- Page 137 and 138:
Chapter 6 System Comparison In this
- Page 139 and 140:
uns at over 165 Kbits/s on the Java
- Page 141 and 142:
and the end-to-end security mechani
- Page 143 and 144:
6.1.4 Secure Electronic Transaction
- Page 145 and 146:
end-to-end client authentication, a
- Page 147 and 148:
• In comparing the employment of
- Page 149 and 150:
• A mobile payment transaction ha
- Page 151 and 152:
Although it is impossible to make u
- Page 153 and 154:
Chapter 7 Conclusions and Future Wo
- Page 155 and 156:
Additionally, the security API pack
- Page 157 and 158:
this thesis. However, the transacti
- Page 159 and 160:
K E Denotes the secret key for the
- Page 161 and 162:
[RK S ,PK S ] Denotes a digital sig
- Page 163 and 164:
FIPS FORTRAN Federal Information Pr
- Page 165 and 166:
MFA MIDlet MIDP Mobile Device Multi
- Page 167 and 168:
SFA SHA SHA-1 SM Smartphone Single-
- Page 169 and 170:
References ABI Research. (2007). 20
- Page 171 and 172:
Diffie, W., & Hellman, M. (1976). N
- Page 173 and 174:
Java Community Process. (2002). Mob
- Page 175 and 176:
Microsoft Corporation. (2009). Wind
- Page 177 and 178:
Roto, V., & Oulasvirta, A. (2005).
- Page 179 and 180:
Tipton, H. F., & Krause, M. (2007).
- Page 181 and 182:
Appendix Part of Client Simulation
- Page 183 and 184:
24 public class MoBankMIDlet extend
- Page 185 and 186:
75 return alert_notes ; 76 } 77 78
- Page 187 and 188:
129 / ** 130 * The MoBankMIDlet c o
- Page 189 and 190:
167 / / w r i t e post −a c t i o
- Page 191 and 192:
208 / ///GEN−BEGIN:∣66− g e t
- Page 193 and 194:
251 textAccound = new TextField ( "
- Page 195 and 196:
285 / / w r i t e pre−a c t i o n
- Page 197 and 198:
324 / / w r i t e pre−a c t i o n
- Page 199 and 200:
367 / / //GEN−END:∣74− g e t
- Page 201 and 202:
409 groupPayto = new ChoiceGroup (
- Page 203 and 204:
America / Edmonton " ) );/ / GEN−
- Page 205 and 206:
487 * R e t u r n s an i n i t i l
- Page 207 and 208:
528 return sucForm ; 529 } 530 / /
- Page 209 and 210:
569 loginScreen = new LoginScreen (
- Page 211 and 212:
614 return image1 ; 615 } 616 / / /
- Page 213 and 214:
656 public Image getImage2 ( ) { 65
- Page 215 and 216:
699 / / w r i t e pre−a c t i o n
- Page 217 and 218:
740 public void execute ( ) throws
- Page 219 and 220:
787 / / //GEN−END:∣156− gette
- Page 221 and 222:
825 * @return t h e i n i t i a l i
- Page 223 and 224:
868 * R e t u r n s an i n i t i l
- Page 225 and 226:
913 * @return t h e i n i t i a l i
- Page 227 and 228:
962 963 / ** 964 * C a l l e d t o
- Page 229 and 230:
24 25 / ** 26 * HTTP CONNECTION TO
- Page 231 and 232:
72 } catch ( ClassCastException e )
- Page 233 and 234:
13 import org . bouncycastle . asn1
- Page 235 and 236:
63 64 65 } 66 67 68 69 / ** 70 * 71
- Page 237 and 238:
AES256Crypto package org.yunpu.cryp
- Page 239 and 240:
40 private SecureRandom random = ne