The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2010 vol.43)
pp: 54-60
Jaak Tepandi , Tallinn University of Technology,
Ilja Tšahhirov , Tallinn University of Technology,
Stanislav Vassiljev , Tallinn University of Technology,
ABSTRACT
Wireless public-key infrastructure technology is used in many security-critical applications including banking and digital signing. An analysis of WPKI security using ID-card-based PKI as a benchmark highlights various risks and their implications for mobile voting.
INDEX TERMS
Security and privacy, Mobile/Wireless, Networking and communications, Mobile voting, Public-key cryptography
CITATION
Jaak Tepandi, Ilja Tšahhirov, Stanislav Vassiljev, "Wireless PKI Security and Mobile Voting", Computer, vol.43, no. 6, pp. 54-60, June 2010, doi:10.1109/MC.2009.418
REFERENCES
1. The 3rd Generation Partnership Project, "Characteristics of the Universal Subscriber Identity Module (USIM) Application," technical specification 3GPP TS 31.02; www.3gpp.org/ftp/Specs/html-info31102.htm .
2. European Telecommunications Standards Institute, "Mobile Commerce (M-COMM); Mobile Signature Service; Web Service Interface. V1.1.4," technical specification ETSI TS 102 204 V1.1.4 (2003-08), http://docbox.etsi.org/EC_Files/EC_Files ts_102204v010104p.pdf.
3. Baltic WPKI Forum; http:/wpki.eu.
4. The WPKI Non-Profit Association; www.wpki.netindex_eng.html.
5. M. Assora, J. Kadirire, and A. Shirvani, "Using WPKI for Security of Web Transaction," Proc. 8th Int'l Conf. E-Commerce and Web Technologies (EC-Web 07), LNCS 4655, Springer, 2007, pp. 11-20.
6. M. Hassinen, K. Hyppönen, and E. Trichina, "Utilizing National Public-Key Infrastructure in Mobile Payment Systems," Electronic Commerce Research and Applications, vol. 7, no. 2, 2008, pp. 214-231.
7. R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS Session-Aware User Authentication," Computer, Mar. 2008, pp. 59-65.
8. G.E.G. Beroggi, "Secure and Easy Internet Voting," Computer, Feb. 2008, pp. 52-56.
9. D.L. Dill and D. Castro, "Point/Counterpoint: The U.S. Should Ban Paperless Electronic Voting Machines," Comm. ACM, vol. 51, no. 10, 2008, pp. 29-33.
10. N. Paul and A.S. Tanenbaum, "Trustworthy Voting: From Machine to System," Computer, May 2009, pp. 23-29.
11. Estonian National Electoral Committee, "General Description of the E-Voting System," 2004; www.vvk.ee/public/dokYldkirjeldus-eng.pdf .
12. J. Tepandi and T. Martens, "Managing Security Risks in E-Voting over the Internet," Exploiting the Knowledge Economy: Issues, Applications and Case Studies—Part 1, P. Cunningham, and M. Cunningham eds., IOS Press, 2006, pp. 349-355.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool