Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,059 papers from all fields of science
Search
Sign In
Create Free Account
Wireless Public Key Infrastructure
Known as:
WPKI
Wireless Public Key Infrastructure (WPKI) is a two-factor authentication scheme using mainly the mobile phone and a laptop. It is mainly promoted by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Laptop
Mobile phone
Mobile security
Wireless security
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Secure mobile payment framework based on UICC with formal verification
S. Ahamad
,
V. N. Sastry
,
S. Udgata
Int. J. Comput. Sci. Eng.
2014
Corpus ID: 207408423
In this paper, we propose a secure mobile payments framework based on universal integrated circuit card UICC by defining: a a…
Expand
2013
2013
Research on mobile electronic commerce security technology based on WPKI
Bo Zhang
Other Conferences
2013
Corpus ID: 10294317
Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e…
Expand
2010
2010
The design and implementation of accelerated authentication system for mobile platform
Liping Du
,
Ying Li
,
Guifen Zhao
International Conference on Information…
2010
Corpus ID: 536579
This paper designs and implements an accelerated authentication system for mobile platform. This system is based on CSK (combined…
Expand
2010
2010
Security design of WPKI-based on-line payment system
Jia Xiang-peng
2010
Corpus ID: 64289890
Aimed at the security problems that exist in the online payment system,a solution based on WPKI is proposed,and then a gas…
Expand
2009
2009
Security Study of Mobile Business Based on WPKI
Longyi Li
,
Lihua Tao
Eighth International Conference on Mobile…
2009
Corpus ID: 45173454
Mobile business is a developing trend of e-business, security of mobile business provides a basis and protection for the normal…
Expand
2009
2009
New Certificate Status Verification Scheme Based on OCSP for Wireless Environment
Xu Zhao
,
Wenyan Zhai
,
Shanshan Cao
International Forum on Computer Science…
2009
Corpus ID: 14444398
Certificate status verification is one of the most important parts in WPKI. Aimed at dealing with the problems of certificate…
Expand
Highly Cited
2007
Highly Cited
2007
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
Yong Lee
,
Jaeil Lee
,
Joo-Seok Song
Computer Communications
2007
Corpus ID: 8628551
2003
2003
Secure Wireless Payment Protocol
Hong Wang
,
E. Kranakis
International Conference on Wireless Networks
2003
Corpus ID: 7598021
With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the…
Expand
2002
2002
Secure software download for programmable mobile user equipment
C. Yeun
,
T. Farnham
2002
Corpus ID: 62545053
At present, both symmetric and asymmetric cryptography have been proposed to provide secure software download. However, these…
Expand
2001
2001
Secure M-Commerce with WPKI
C. Yeun
,
T. Farnham
2001
Corpus ID: 14617001
A lapping machine for the production of reinforcement baskets with a bell sleeve for concrete pipes and the like, which comprises…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE