跳到主要內容

臺灣博碩士論文加值系統

(44.210.83.132) 您好!臺灣時間:2024/05/25 20:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:楊芳捷
研究生(外文):Fang-Jie Yang
論文名稱:基於Android Pay的行動支付機制
論文名稱(外文):An Android Pay based Mobile Payment Scheme
指導教授:楊維邦楊維邦引用關係葉國暉葉國暉引用關係
指導教授(外文):Wei-Pang YangKuo-Hui Yeh
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊管理碩士學位學程
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
論文頁數:31
中文關鍵詞:電子商務橢圓曲線加密行動支付資訊安全安卓支付
外文關鍵詞:Electronic CommerceElliptic Curve CryptographyMobile PaymentSecurityAndroid Pay
相關次數:
  • 被引用被引用:3
  • 點閱點閱:1326
  • 評分評分:
  • 下載下載:404
  • 收藏至我的研究室書目清單書目收藏:4
近年來電子商務的崛起,行動支付的應用服務逐漸普及在人們的日常生活之中,然而,在這種方便又快速的支付模式之下,存在惡意使用者盜刷及盜用風險,潛藏著許多安全的疑慮。因此,如何在公開的網路系統下實現安全支付的服務的安全性及效率性,都是使用者及電信公司所重視的課題之一。在本論文中,吾人將針對Android Pay系統上的安全性進行探討與研究,並提出一套可強化Android Pay的行動支付機制,方法中採用了橢圓曲線加密(Elliptic Curve Cryptography, ECC)系統來保障交易之安全性及效率性。根據本研究的安全與效能分析,吾人證實了所提出之行動支付機制可有效協助行動支付使用者在公開的網路系統下安全地進行支付交易,並達到支付的穩定性與效率性。
How to simultaneously achieve the security robustness and maintain the usage convenience of mobile payment under insecure public communication networks is a crucial topic for handheld mobile device manufacturers, telecommunication companies and mobile users. In this paper, we present an Android Pay based robust mobile payment scheme for public mobile communication networks. The design utilizes the Android Pay API implementation and the Elliptic Curve Cryptography (ECC) system to guarantee the transaction security. With formally defined adversary model and security analysis, the proposed scheme can provide strong transaction robustness and communication security to mobile user during online payment transaction. In addition, the performance evaluation shows the practicability of our proposed mobile payment scheme as the total computation cost is acceptable for common handheld mobile phones.
ABSTRACT I
摘要 II
致謝 III
CONTENT IV
LIST OF FIGURES V
LIST OF TABLES VI
CHAPTER 1 INTRODUCTION 1
CHAPTER 2 RELATED WORKS 4
CHAPTER 3 THE ANDROID PAY BASED MOBILE PAYMENT SCHEME 8
3.1 ANDROID PAY 8
3.2 THE PROPOSED SCHEME 10
3.2.1 System Initialization 11
3.2.2 Normal Transaction Process 13
CHAPTER 4 SECURITY ANALYSIS AND PERFORMANCE EVALUATION 18
4.1 ADVERSARY MODEL 18
4.2 SECURITY ANALYSIS 20
4.3 PERFORMANCE EVALUATION 24
CHAPTER 5 CONCLUSION 26
REFERENCES 27

[1]S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” In Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science, Vol. 2894, pp. 452-473, 2003.
[2]X. Huang, Y. Mu, W. Susilo, D.S.Wong and W. Wu, “Certificateless signature revisited,” In Proceedings of ACISP 2007, Lecture Notes in Computer Science, Vol. 4586, pp. 308-322, 2007.
[3]Java Elliptic Curve Cryptography project, http://jecc.sourceforge.net/ (Retrieved at 31 May 2015)
[4]Izabela Lacmanovi, Biljana Radulovi and Dejan Lacmanovi, “Contactless payment systems based on RFID Technology,” In Proceedings of MIPRO 2010, pp. 1114-1119, 2010.
[5]Luca Mainetti, Luigi Patrono and Roberto Vergallo, “IDA-Pay: an innovative micro-payment system based on NFC technology for Android mobile devices,” In Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp.1-6, 2012.
[6]ByungRae Cha and JongWon Kim, “Design of NFC based Micro-payment to support MD authentication and Privacy for Trade Safety in NFC Applications,” In Proceedings of the Seventh International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), pp. 710-713, 2013.
[7]Erol Kazan and Jan Damsgaard, “A Framework for Analyzing Digital Payment as A Multi-Sided Platform: a Study of Three European NFC Solutions,” In Proceedings of the European Conference on Information Systems, paper 155, 2013.
[8]Wei-Dar Chen, K.E. Mayes, Yuan-Hung Lien, Jung-Hui Chiu, “NFC mobile payment with Citizen Digital Certificate,” In Proceedings of the 2nd International Conference on Next Generation Information Technology (ICNIT), pp. 120-126, 2011.
[9]Erik-Oliver Blassa, Anil Kurmusb, Refik Molvac and Thorsten Strufed, “PSP: Private and Secure Payment with RFID,” Computer Communications, Volume 36, Issue 4, pp. 468-480, 2013.
[10]T. Ali and M.A. Awal, “Secure Mobile Communication in m-payment system using NFC Technology,” In Proceedings of the 2012 International Conference on Informatics, Electronics &; Vision (ICIEV), pp. 133-136, 2012.
[11]Soonhwa Sung, Cheong Youn, Eunbae Kong and Jaecheol Ryou, “User authentication using mobile phones for mobile payment,” In Proceedings of the 2015 International Conference on Information Networking (ICOIN), pp. 51-56, 2015.
[12]R. Magnier-Watanabe, “An Institutional Perspective of Mobile Payment Adoption: The Case of Japan,” In Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS), pp. 1043-1052, 2014.
[13]S. Abughazalah, K. Markantonakis and K. Mayes, “Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR,” In Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 422-431, 2014.
[14]Babatunde Ojetund, Naoki Shibata, Juntao Gao and Minoru Ito, “An Endorsement-Based Mobile Payment System for a Disaster Area,” In Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 482-489, 2015.
[15]Wai-Ming To and L.S.L. Lai, “Mobile Banking and Payment in China,” IT Professional, Volume 16, Issue 3, pp. 22-27, 2014.
[16]Android Pay API Process Flow, https://developers.google.com/android-pay/diagrams (Retrieved at 31 May 2015)
[17]Android Pay API Tutorial, https://developers.google.com/android-pay/android/tutorial (Retrieved at 31 May 2015)
[18]Apple Pay, https://www.apple.com/apple-pay/
[19]Google Wallet, https://www.google.com/wallet/

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林娟娟、林禹均、王舒民(2010)。網路消費者的知覺風險對其購買態度及意願之研究 -以網路購物經驗與退貨經驗為調節變數,電子商務研究第八卷,第一期,pp.37-70。
2. 林秋慧(2008)。以計劃行為理論探討大專教職員休閒運動行為,南亞學報第28期。
3. 林秋慧(2008)。以計畫行為理論探討大專教職員休閒運動行為。南亞學報,28,pp.367-384。
4. 吳振輝、劉聯芳(2008)。產品品質、品牌形象與自我概念連結對顧客關係之影響,弘光人文社會學報第 8 期,p.45-68
5. 王昭雄、陳得發(2007)。直銷公司美容保養品市場定位、價格策略與消費者認知之差異分析,直銷管理評論第一卷第一期,pp.1-26。
6. 王昭雄,陳得發(2007)。直銷公司與直銷商對服務品質認知差距之研究。直銷管理評論,1卷,1,pp.81-105。
7. 張文華(2000)。「組織信任之初探」,人力發展月刊行政論述,第八十期。
8. 許鈴金、葉小華(2013)。遠東學報,品牌信任、品牌情感和關係品質對顧客忠誠之影響:認知公平之角色探討,pp.210。
9. 陳彩鳳、曾信超(2006)。信任危機,護理雜誌,53(1),pp.10-16。
10. 陳得發,蔡昭玉(2009)。直銷產品消費者知覺風險與降低知覺風險策略之研究 -以網路族群為例,直銷管理評論;1 卷 2 期, pp.27 - 54。
11. 彭台光、高月慈與林鉦棽(2006)。管理研究中的共同方法變異:問題本質、影響、測詴和補救, 管理學報,23(1),pp.77-98。