期刊文献+

移动电子商务中的短信验证码安全威胁问题研究 被引量:3

Research on Security Threats of SMS Verification Code Based on Mobile E-commerce
下载PDF
导出
摘要 随着移动电子商务安全问题的凸显,作为常见解决方案的短信验证码技术面临着短信木马和恶意软件、运营商或者服务商发生信息泄露、补卡攻击和克隆攻击、手机打码平台等安全威胁。针对上述问题,文章分别从电商平台、用户和服务商角度提出了加强对数据安全的保护、增强对手机系统安全威胁的认知和增加智能码验证方式等应对策略。 With the emergence of security problem of mobile e-commerce, the SMS verification code technology, which is a common solution, is facing some security threats such as the SMS Trojans and malware, card information leak of operators or service providers, re-card attack and clone attack, mobile phone platform code and so on. In this paper, some strategies are proposed to solve these prob- lems. It is pointed out that the electronic business platform should strengthen the protection of data safety, the users should enhance the awareness of security threats of mobile phone system, and the service providers should introduce the intelligent code verification mode.
作者 范敏 陈磊
出处 《合肥工业大学学报(社会科学版)》 2017年第5期37-41,共5页 Journal of Hefei University of Technology(Social Sciences)
基金 安徽省2015年高校人文社科项目(sk2015a464) 合肥市2016年度社科规划项目(2016-015) 合肥师范学院2015年度县校产学研合作项目(cxyhzsk011)
关键词 短信验证码 短信木马 信息泄露 SMS verification code SMS Trojans information leak
  • 相关文献

参考文献6

二级参考文献40

  • 1梁少娥,蔡振治.3G时代我国移动电子商务的安全问题与应对策略[J].肇庆学院学报,2010,31(4):55-58. 被引量:5
  • 2周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 3Neuman B, Ts~ T. Kerberos: authentication service for computer networks [J]. IEEE Communication Magazine, 1994, 32(9): 33-38.
  • 4Charlott E, Markus F, Ivar J. A criteria-based evalua tion framework for authentication schemes [C] // IMS. ARES "09. International Conference on Availa bility, Reliability and Security. Barcelona, 2009 (3) : 865-869.
  • 5Patroklos Argyroudis G, Raja V, Hitesh T, et al. Performance analysis of cryptographic protocols on handheld devicesEC3//Third IEEE International Sym- posium on Network Computing and Applications. Los Aloamitos, 2004: 169-174.
  • 6Vipul G, Sumit G, Sheueling C, et al. Performance analysis of elliptic curve cryptography for SSL[M]. ACM Workshop on Wireless Security. USA, New York, 2002: 87-94.
  • 7Kumar V K N. Mangipudi. New authentication and key agreement protocols for wireless applications[D].USA, State of Norh Dakota, North Dakota State University, 2005.
  • 8Yang M, Runtong Z, Qin W, New authentication scheme for M-commerce based on two dimension bar code[C]// IEEE International Conference on Service Operations and Logistics, and Informatics. China, Beijing, 2008: 1029-1034.
  • 9Amani N. Using SMS as a business communication tools forSMES[ C]// The 6th Regional Innovation System and In-novation Clusters, 2009.
  • 10Symantec. Whitepaper: Two-factor Authentication: A TCOViewpoint[ EB/OL]. https://www4. Symantec, com/mkt-ginfo/whitepaper/user _ authentication/whitepaper-twofac-tor-authentication. pdf, 2015-12-15.

共引文献22

同被引文献15

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部