List of Figures Primitive transactions 25 3D SET for Mobiles 26 Antovski et al


List of Figures

Primitive transactions 25
3D SET for Mobiles 26
Antovski et al.’s approach 28
The authentication scheme according to Dai et al.’s approach. …………….30
The payment scheme according to Dai et al.’s approach………………………. 33
SET/A………………. 35
Pay box transaction 37
Integrated mobile payment framework 41

Overview of the proposed model 48
Payment transaction 51

The proposed framework .68
The proposed SET payment system…………………………………………………………………….….70

Login screen with password authentication of KSL wallet 96
Class diagram of KSL wallet 97
Snapshots of KSL wallet while performing Merchant Registration Protocol 101
Snapshots of KSL wallet while performing Payment Protocol . . …………….104

The proposed micropayment protocol 137

List of Tables

Summary of existing mobile payment systems 29

The number of cryptographic operations of KSLv1 and KSLv2
at client, merchant, and payment gateway, respectively 88

The number of cryptographic operations of SET , 3KP , and Antovski’s protocol at client, merchant, and payment gateway, respectively 94

Comparison between 3DES and AES algorithms in terms of computational requirement and energy consumption 94
Format of the message sent from client in Merchant Registration Protocol 100
Message format of Payment Ordering request of KSLv1 102
Message format of Debit request of KSLv1 102
Message format of Credit request of KSLv1 103
Message format of Credit response of KSLv1 103
Message format of Debit response of KSLv1 104
Message format of Payment Ordering response of KSLv1 105
Time taken at client on performing Merchant Registration Protocol 142
Time taken at merchant on performing Merchant Registration Protocol 106

Time taken at client on performing Payment Protocol 106

The number of cryptographic operations applied to our proposed prepaid protocol and PayFair in 1 transaction. ……………………………………149
The number of cryptographic operations at client applied to the proposed prepaid protocol and PayFair, respectively, when the client performs transactions with 10 different merchants and there are 20 times that she spends the coins over the limit specified to each merchant 149
The number of cryptographic operations applied to the proposed postpaid protocol, PayWord and Park et al.’s protocol in 1 transaction 149
The number of cryptographic operations at client applied to the proposed protocols, PayWord, and Park et al.’s protocol, respectively, when the client performs transactions with 10 different merchants and there are 20 times that she spends the coins over
the limit specified to each merchant 150