Conferences related to Secure Wireless Transactions

Back to Top

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies


2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

NTMS'2018 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2014 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2012 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2011 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)

    New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2008 New Technologies, Mobility and Security (NTMS)

    NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and t


2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)

* Wearable Electronics and Health & Leisure* Micro/Nano-sensor and BioMEMS* IC Design and System Integration* Multi-core Processor and Reconfigurable Computing* Cloud Computing & Internet of Things (IoT)* Cryptographic Algorithm and Security Management* Next Generation Networking and IPv6* Wireless Communication and Networking Engineering* Cognitive Radio and Software Defined Radio* EMC Theory and RFID Techniques* Pattern Recognition and Applications

  • 2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    ¿ Wearable Electronics and Health & Leisure¿ Micro/Nano-sensor and BioMEMS¿ IC Design and System Integration¿ Multi-core Processor and Reconfigurable Computing¿ Cloud Computing & Internet of Things (IoT)¿ Cryptographic Algorithm and Security Management¿ Next Generation Networking and IPv6¿ Wireless Communication and Networking Engineering¿ Cognitive Radio and Software Defined Radio¿ EMC Theory and RFID Techniques¿ Pattern Recognition and Applications

  • 2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    ¿ Wearable Electronics and Health & Leisure¿ Micro/Nano-sensor and BioMEMS¿ IC Design and System Integration¿ Multi-core Processor and Reconfigurable Computing¿ Cloud Computing & Internet of Things (IoT)¿ Cryptographic Algorithm and Security Management¿ Next Generation Networking and IPv6¿ Wireless Communication and Networking Engineering¿ Cognitive Radio and Software Defined Radio¿ EMC Theory and RFID Techniques¿ Pattern Recognition and Applications

  • 2014 International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    Wearable Electronics and Health & LeisureMicro/Nano-sensor and BioMEMSIC Design and System IntegrationMulti-core Processor and Reconfigurable ComputingCloud Computing & Internet of Things (IoT)Cryptographic Algorithm and Security ManagementNext Generation Networking and IPv6Wireless Communication and Networking EngineeringCognitive Radio and Software Defined RadioEMC Theory and RFID TechniquesPattern Recognition and Applications

  • 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)

    Micro/Nano-sensor and BioMEMSIC Design and System IntegrationMulti-core Processor and Reconfigurable ComputingCloud Computing & Internet of Things (IoT)Cryptographic Algorithm and Security ManagementNext Generation Networking and IPv6Wireless Communication and Networking EngineeringCognitive Radio and Software Defined RadioEMC Theory and RFID TechniquesPattern Recognition and Applications

  • 2012 International Conference on Anti-Counterfeiting, Security and Identification (2012 ASID)

    Cloud Computing, RFID Techniques and applications, IC Design and System Integration, Pattern recognition and applications, Cryptographic algorithm and security Management, Cognitive Radio and Software Defined Radio, Next Generation Networking and IPv6, Wireless communication and Networking engineering, EMC Theory and applications, Internet of Things (IoT).

  • 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification (2011 ASID)

    Internet of Things (IoT) RFID Techniques and applications IC Design and System Integration EMC Theory and applications Pattern recognition and applications Cryptograph standards and management Wireless communication and Networking engineering Next Generation Networking and IPv6 Information Management and polices Conference Keywords: anti-counterfeiting, security, identification, asid, rfid, and antenna, network security,internet of things, rfid techniques and applications, wireless com

  • 2010 International Conference on Anti-Counterfeiting, Security and Identification (2010 ASID)

    Live demonstrations describing novel work on systems, applications and services of the Internet reaching out into the real world of physical objects, problems related to RFID and Antenna, IC Design and System Integration, Wireless Communication and Network Security, Cryptographic Algorithm and Hardware Implementation, Anti-counterfeiting and Identification, Information Management and Industries Polices.

  • 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID)

    RFID and Antenna, Wireless Comm and Network Security, Cryptographical Algorithm and realization on hardward, Anti-counterfeiting and Identification, Information management and industries polices

  • 2008 2nd International Conference on Anti-counterfeiting, Security, and Identification (2008 ASID)

    RFID and Antenna, Wireless communication and Network security, Cryptographical algorithm and realization on hardware, Anti-counterfeiting and Identification, Information management and Industries polices

  • 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID)


2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)

The ICITST is an international refereed conference dedicated to the advancement of theory andpractical implementation of secured Internet transactions and to fostering discussions on information technology evolution.


2017 29th International Conference on Microelectronics (ICM)

Offering an overview of latest achievement in devices and applications to build various circuits and microsystems


More Conferences

Periodicals related to Secure Wireless Transactions

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


More Periodicals

Most published Xplore authors for Secure Wireless Transactions

Back to Top

Xplore Articles related to Secure Wireless Transactions

Back to Top

A New Secure Wireless Financial Transaction Architecture

EUROCON 2005 - The International Conference on "Computer as a Tool", 2005

Mobile commerce (m-commerce) offers a practical, and complementary solution to credit card transactions. This paper proposes a secure wireless financial transaction (SWiFT) system and describes a prototype implementation. A review of similar m-commerce solutions is included with comparison to the proposed SWiFT system


An hybrid secure scheme for secure transmission in grid based Wireless Sensor Network

2015 IEEE International Advance Computing Conference (IACC), 2015

In a Wireless Sensor Networks (WSNs) the sensor nodes are placed in an environment depending on the applications where secure communication is in high demand. To ensure the privacy and safety of data transactions in the network, a unique identification for the nodes and secure key for transportation have become major concerns. In order to establish a secure communication channel ...


A secure wireless point of sale system

2011 IEEE EUROCON - International Conference on Computer as a Tool, 2011

Online financial transactions using mobile devices is a convenient solution for future payment systems. However, security on the wireless channel and the cost of an Internet connection on the mobile device limit its adoption and feasibility. This paper presents a solution that uses an Infra-red link between the mobile device and a dongle connected to a Point of Sale (POS) ...


Integrated secure wireless ordering and transaction processing system architecture

2009 International Conference on the Current Trends in Information Technology (CTIT), 2009

This paper presents the architecture of an integrated secure wireless ordering and transaction processing system. Wireless communication between the various system components is primarily done using WiFi technology. The ordering and subsequent transaction processing are done at the user end using a WiFi enabled PDA that communicates with a local server which in turn sends requests and receives confirmations from ...


JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks

IEEE Transactions on Dependable and Secure Computing, 2009

Hybrid networks consisting of cellular and Wi-Fi networks were proposed as a high-throughput architecture for cellular services. In such networks, devices equipped with cellular and Wi-Fi network cards access Internet services through the cellular base station. The Wi-Fi interface is used to provide a better service to clients that are far away from the base station, via multihop ad hoc ...


More Xplore Articles

Educational Resources on Secure Wireless Transactions

Back to Top

IEEE.tv Videos

Brooklyn 5G Summit: Massive MIMO Technology for 5G (6GHz - 100GHz)
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
Lantronix Premierwave
5G Proof-of-Concept (PoC) Systems with focus on real use cases - Juha Silipa and Mark Cudak: Brooklyn 5G Summit 2017
How will 5G drive the self-driving car? Challenges from a V2X solution provider's point of view - Jozsef Kovacs: Brooklyn 5G Summit 2017
The Future of Computing And Computer Science
IEEE Green Energy Summit 2015: Closing Remarks
Building IoT Projects Faster - Ed Hemphill at Fog World Congress 2018
IEEE Green Energy Summit 2015: Keynote & Opening Remarks
Risto Miikkilainen - Multiagent Learning Through Neuroevolution
IMS 2015: Maxwell's Equation - The Genesis
IEEE Member Digital Library
802.19: Wireless Coexistence
The Evolution of Secure Things - Alex Gantman, 2017 IEEE VIC Summit
Low-Power and Secure Lightweight Cryptography Via TFET-Based Energy Recovery Circuits: IEEE Rebooting Computing 2017
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Robotics History: Narratives and Networks Oral Histories:Ken Goldberg
AuthorLab: Video Featuring a Discussion of the Author Gateway
Philippe Wolf: Designing Secure and Private Complex Data Systems - WF-IoT 2015
Yoshihiro Ohba: Secure Multicast Group Communication in ECHONET-Lite - Industry Forum Panel: WF IoT 2016

IEEE-USA E-Books

  • A New Secure Wireless Financial Transaction Architecture

    Mobile commerce (m-commerce) offers a practical, and complementary solution to credit card transactions. This paper proposes a secure wireless financial transaction (SWiFT) system and describes a prototype implementation. A review of similar m-commerce solutions is included with comparison to the proposed SWiFT system

  • An hybrid secure scheme for secure transmission in grid based Wireless Sensor Network

    In a Wireless Sensor Networks (WSNs) the sensor nodes are placed in an environment depending on the applications where secure communication is in high demand. To ensure the privacy and safety of data transactions in the network, a unique identification for the nodes and secure key for transportation have become major concerns. In order to establish a secure communication channel in the network, care and address the recourse constraints related to the devices and the scalability of the network when designing a secure key management. An approach for secure communication channel establishment is made in order to suite the functional and architectural features of WSNs. Here a hybrid key management scheme for symmetric key cryptography is attempted to establish a secure communication. An ECC and DH based key management and a certificate generation scheme, where the key is generated to decrypt the certificates to establish link for communication in the network. The hybrid scheme is tested based on amount of energy consumed and security analysis by simulation.

  • A secure wireless point of sale system

    Online financial transactions using mobile devices is a convenient solution for future payment systems. However, security on the wireless channel and the cost of an Internet connection on the mobile device limit its adoption and feasibility. This paper presents a solution that uses an Infra-red link between the mobile device and a dongle connected to a Point of Sale (POS) which in turn is connected through a network to the transaction server. Transactions are then carried out through the server's communication link with the banking system. To render the system secure, a simple solution based on a cryptographic hash function is adopted to protect each packet from eavesdropping. A prototype was developed in order to test and verify the proposed solution.

  • Integrated secure wireless ordering and transaction processing system architecture

    This paper presents the architecture of an integrated secure wireless ordering and transaction processing system. Wireless communication between the various system components is primarily done using WiFi technology. The ordering and subsequent transaction processing are done at the user end using a WiFi enabled PDA that communicates with a local server which in turn sends requests and receives confirmations from the various departments involved in processing the order. The system incorporates security features at all levels of the architecture in order to prevent unauthorized access, assign privileges to users, and maintain the integrity of the information being exchanged. The complete system was fully implemented as a prototype and its operation verified. The system architecture is highly flexible and a scalable one which enables expansion whenever the need arises.

  • JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks

    Hybrid networks consisting of cellular and Wi-Fi networks were proposed as a high-throughput architecture for cellular services. In such networks, devices equipped with cellular and Wi-Fi network cards access Internet services through the cellular base station. The Wi-Fi interface is used to provide a better service to clients that are far away from the base station, via multihop ad hoc paths. The modified trust model of hybrid networks generates a set of new security challenges as clients rely on intermediate nodes to participate effectively in the resource reservation process and data forwarding. In this paper, we introduce JANUS, a framework for scalable, secure, and efficient routing for hybrid cellular and Wi-Fi networks. JANUS uses a scalable routing algorithm with multiple channel access, for improved network throughput. In addition, it provides protection against selfish nodes through a secure crediting protocol and protection against malicious nodes through secure route establishment and data forwarding mechanisms. We evaluate JANUS experimentally and show that its performance is 85 percent of the optimum algorithm, improving with a factor greater than 50 percent over previous work. We evaluate the security overhead of JANUS against two types of attacks: less aggressive, but sufficient for some applications, selfish attacks and purely malicious attacks.

  • Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

    In this paper, we propose E-STAR for establishing stable and reliable routes in heterogeneous multihop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay others' packets and charges those that send packets. The trust system evaluates the nodes' competence and reliability in relaying packets in terms of multi-dimensional trust values. The trust values are attached to the nodes' public-key certificates to be used in making routing decisions. We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. This is because any loss of trust will result in loss of future earnings. Moreover, for the efficient implementation of the trust system, the trust values are computed by processing the payment receipts. Analytical results demonstrate that E-STAR can secure the payment and trust calculation without false accusations. Simulation results demonstrate that our routing protocols can improve the packet delivery ratio and route stability.

  • KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach for disseminating data to a number of users. To provide secure access to data in wireless broadcast services, symmetric-key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. With regard to various subscriptions, an efficient key management for distributing and changing keys is in great demand for access control in broadcast services. In this paper, we propose an efficient key management scheme, namely, key tree reuse (KTR), to handle key distribution with regard to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45 percent of communication overhead in the broadcast channel and about 50 percent of decryption cost for each user compared with logical-key-hierarchy-based approaches.

  • P2P-Paid: A Peer-to-Peer Wireless Payment System

    The fast advance of wireless networking, communication, and mobile technology is making a big impact on daily life. The significant increase of mobile device users has caused a strong demand for secured wireless information services and reliable mobile commerce applications. Since wireless payment is a critical part of most wireless information services and mobile commerce applications, generating secured mobile payment systems is becoming a hot research topic in both the e-commerce research community and wireless commerce industry. This paper proposes a peer-to-peer wireless payment system, known as P2P-Paid, to allow two mobile users to conduct wireless payment transactions over Bluetooth communications. The system uses a 2-dimensional secured protocol, which not only supports the peer-to-peer (P2P) payment transactions between two mobile clients using Bluetooth communications, but also supports the related secured transactions between the payment server and mobile clients. This paper provides a system overview about system functional features, system architecture, and technologies used. Moreover, an integrated security solution for the P2P-Paid system is described. Our first phase implementation is reported, and application examples are given to demonstrate the functions and feasibility of this system

  • Secure multimedia communication in wireless mesh networks

    Wireless mesh networks (WMNs) is a new type of network paradigm in which each node is communicates to others to enhance network reliability and performance. Multimedia communication in wireless mesh network is a challenging task. The concept of field based routing (FBR) is gaining the popularity because it uses a little information to route the packets. These routing algorithms are robust, inexpensive and scalable. Authors believe that the FBR is the better choice for the multimedia communication in wireless mesh networks. Because it exchanges little information for building and maintenance of the routing tables. Despite from the robustness and scalability of the FBR it is also prone to different active and passive attacks. In this paper we first study that how multimedia communication can be done using FBR and than take some security measures to eliminate the risk of intruder intervention in such communication. Multimedia FBR and its security has is extensively studied using Omnet++ network simulator for to identify and isolate the malicious node and to prevent the traffic flows from various active and passive attacks.

  • MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection

    Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.



Standards related to Secure Wireless Transactions

Back to Top

No standards are currently tagged "Secure Wireless Transactions"


Jobs related to Secure Wireless Transactions

Back to Top