Skip to main content

A HIICA(Highly-Improved Intra CA) Design for M-Commerce

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3982))

Included in the following conference series:

  • 1386 Accesses

Abstract

HIICA(Highly-improved Intra CA) proposed in this paper is internal CA which highly improved by using OCSP(Online Certificate Status Protocol)and LDAP(Lightweight Directory Access Protocol). It provides more security and confidentiality than external CA. As HIICA is provided with certification policy from PCA(Policy Certificate Authority) and sets an special environment like subscriber registration process, it reduces additional expense and strengthens the security at the certificate request process through HIICA agent. Therefore, secure electronic payment system is optimized through HIICA design that removed the existing CA complex process and unsecure elements.

This research was supported by the program for the Training of Graduate Students in Regional Innovation, which was conducted by the Ministry of Commerce, Industry and Energy of the Korean Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, B.K.: E-Commerce Security, Namdoo Books (2002)

    Google Scholar 

  2. Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  3. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  4. Cho, I.S., Lee, B.K.: ASEP Protocol Design. ICIS 2, 366–372 (2002)

    Google Scholar 

  5. Yang, S.H., Lee, Y.K., Lee, B.K.: end-to-end authentication function Using F2mECC and EC-DH. Journal of Korean Society for Internet Information 5(1), 403–406 (2004)

    Google Scholar 

  6. Choi, Y.H.: A Study on Performance Improvement of Certificate Validation Algorithm in PKI (2003)

    Google Scholar 

  7. Song, S.Y.: Mobile PKI Authentication Model Using Delegation Ticket (2004)

    Google Scholar 

  8. http://www.certicom.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Bk., Kim, Cm., Shin, Dw., Yang, Sh. (2006). A HIICA(Highly-Improved Intra CA) Design for M-Commerce. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_29

Download citation

  • DOI: https://doi.org/10.1007/11751595_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34075-1

  • Online ISBN: 978-3-540-34076-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics