[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/647503.728465guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Experimenting with Electronic Commerce on the PalmPilot

Published: 01 February 1999 Publication History

Abstract

This paper describes our experience with implementing an electronic payment system for the PalmPilot. Although Palm OS lacks support for many desired security features, we are able to build a system suitable for small payments. We discuss the advantages and disadvantages of using a PDA to make secure payments as opposed to using a smartcard or a desktop PC. In addition, we describe the engineering of PDA-PayWord, our implementation of a commerce protocol that takes advantage of both elliptic curve and RSA public key cryptography to support payments efficiently on PDAs with limited processing capability.

References

[1]
3Com Corporation, http://www.3com.com
[2]
R. Anderson, C. Manifavas, C. Sutherland, "Netcard - a practical electronic cash system", in Fourth Cambridge Workshop on Security Protocols.
[3]
R. Anderson, M. Kuhn, "Tamper resistance - a cautionary note", In 2nd USENIX Workshop on electronic commerce, 1996, pp. 1-11.
[4]
Certicom Co., http://www.certicom.com
[5]
B. Cox, D. Tygar, M. Sirbu, "NetBill security and transaction protocol", http://www.ini.cmu.edu/netbill/home.html.
[6]
CyberCash, http://www.cybercash.com
[7]
N. Daswani, D. Boneh, H. Garcia-Molina, S. Ketchpel, A. Paepcke "SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations", Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998.
[8]
DigiCash, http://www.digicash.com
[9]
Financial applications for the PalmPilot, http://www.pilotzone.com/prod business.html
[10]
A. Glass, "Could the smartcard be dumb", Proceedings of Eurocrypt '86, 1986.
[11]
I. Goldberg, pilotSSLeay-2.01, http://www.isaac.cs.berkeley.edu/pilot/
[12]
R. Hauser, M. Steiner, M. Waidner, "Micro-payments based on iKP", In 14th Wolrd-wide congress on computer and communication security protection, 1996.
[13]
S. Jarecki, A. Odlyzko, "An efficient micropayment system based on probabilistic polling", Proc. Financial Cryptography '97.
[14]
C. Jutla, M. Yung, "Paytree: amortized signature for flexible micropayments", In 2nd USENIX Workshop on electronic commerce, 1996, pp. 213-221.
[15]
L. Lamport, "Password authentication with insecure communication", Communications of the ACM, vol. 24 (11), 1981, pp. 770-771.
[16]
R. Lipton, R. Ostrovsky, "Micro-Payments via efficient coin flipping", Proc. Financial Cryptography '98.
[17]
M. Manasse, "The Millicent protocols for electronic commerce", Proc. of the 1st USENIX workshop on Electronic Commerce.
[18]
Mondex International, http://www.mondex.com
[19]
T. Pederson, "Electronic payments of small amounts", Tech. Report, DAIMI PB- 495, Aarhus University, Computer Science Dept., Aug. 1995.
[20]
R. Rivest, "Lottery tickets as Micro-Cash", Financial Cryptography '97.
[21]
R. Rivest, A. Shamir, "PayWord and MicroMint", CryptoBytes, Vol. 2, No. 1, pp. 7-11. Available from http://www.rsa.com
[22]
Security applications for the PalmPilot, http://www.pilotzone.com/util_security.html
[23]
Secure Electronic Transactions. http://www.setco.org
[24]
Y. Yacobi, "On the continuum between on-line and off-line e-cash systems - I", Proc. Financial Cryptography '97.
[25]
Windows CE 2.0, http://www.microsoft.com/windowsce/

Cited By

View all
  • (2009)Analysis and design of a hardware/software trusted platform module for embedded systemsACM Transactions on Embedded Computing Systems10.1145/1457246.14572548:1(1-31)Online publication date: 4-Jan-2009
  • (2007)A server-aided signature scheme for mobile commerceProceedings of the 2007 international conference on Wireless communications and mobile computing10.1145/1280940.1281061(565-570)Online publication date: 12-Aug-2007
  • (2006)A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security ProtocolsIEEE Transactions on Mobile Computing10.1109/TMC.2006.165:2(128-143)Online publication date: 1-Feb-2006
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FC '99: Proceedings of the Third International Conference on Financial Cryptography
February 1999
268 pages
ISBN:3540663622

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 February 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2009)Analysis and design of a hardware/software trusted platform module for embedded systemsACM Transactions on Embedded Computing Systems10.1145/1457246.14572548:1(1-31)Online publication date: 4-Jan-2009
  • (2007)A server-aided signature scheme for mobile commerceProceedings of the 2007 international conference on Wireless communications and mobile computing10.1145/1280940.1281061(565-570)Online publication date: 12-Aug-2007
  • (2006)A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security ProtocolsIEEE Transactions on Mobile Computing10.1109/TMC.2006.165:2(128-143)Online publication date: 1-Feb-2006
  • (2005)Managing the Performance Impact of Web SecurityElectronic Commerce Research10.1023/B:ELEC.0000045975.59531.085:1(99-116)Online publication date: 1-Jan-2005
  • (2005)CryptoPalmProceedings of the 10th Panhellenic conference on Advances in Informatics10.1007/11573036_62(651-660)Online publication date: 11-Nov-2005
  • (2004)Secure service signaling and fast authorization in programmable networksProceedings of the 6th IFIP TC6 international working conference on Active networks10.5555/1759596.1759603(66-77)Online publication date: 27-Oct-2004
  • (2004)Security as a new dimension in embedded system designProceedings of the 41st annual Design Automation Conference10.1145/996566.996771(753-760)Online publication date: 7-Jun-2004
  • (2003)Emerging challenges in designing secure mobile appliancesAmbient intelligence10.5555/976174.976182(103-127)Online publication date: 1-Jan-2003
  • (2003)Securing Mobile AppliancesProceedings of the conference on Design, Automation and Test in Europe - Volume 110.5555/789083.1022723Online publication date: 3-Mar-2003
  • (2003)Analyzing the energy consumption of security protocolsProceedings of the 2003 international symposium on Low power electronics and design10.1145/871506.871518(30-35)Online publication date: 25-Aug-2003
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media