{"id":"https://openalex.org/W2025448973","doi":"https://doi.org/10.5220/0005059903870392","title":"Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA","display_name":"Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2025448973","doi":"https://doi.org/10.5220/0005059903870392","mag":"2025448973"},"language":"en","primary_location":{"id":"doi:10.5220/0005059903870392","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005059903870392","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005059903870392","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004974268","display_name":"Shizra Sultan","orcid":"https://orcid.org/0000-0003-4201-9503"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shizra Sultan","raw_affiliation_strings":["National University of Science and Technology, Pakistan","Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Science and Technology, Pakistan","institution_ids":[]},{"raw_affiliation_string":"Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030227140","display_name":"Abdul Ghafoor Abbasi","orcid":"https://orcid.org/0000-0002-1433-6803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdul Ghafoor Abbasi","raw_affiliation_strings":["National University of Science and Technology, Pakistan","Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Science and Technology, Pakistan","institution_ids":[]},{"raw_affiliation_string":"Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113494384","display_name":"Awais Shibli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Awais Shibli","raw_affiliation_strings":["National University of Science and Technology, Pakistan","Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Science and Technology, Pakistan","institution_ids":[]},{"raw_affiliation_string":"Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103149189","display_name":"Nasir Ali","orcid":"https://orcid.org/0009-0003-1167-6233"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ali Nasir","raw_affiliation_strings":["National University of Science and Technology, Pakistan","Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National University of Science and Technology, Pakistan","institution_ids":[]},{"raw_affiliation_string":"Department of Computing, School of Electrical Engineering & Computer Sciences, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004974268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16372187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"392"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9527000188827515,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7317880392074585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7081518173217773},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.7049771547317505},{"id":"https://openalex.org/keywords/non-repudiation","display_name":"Non-repudiation","score":0.6499677300453186},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6187583804130554},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.6004295349121094},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5326034426689148},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.5153703093528748},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4598572850227356},{"id":"https://openalex.org/keywords/financial-transaction","display_name":"Financial transaction","score":0.44199734926223755},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.42101985216140747},{"id":"https://openalex.org/keywords/card-security-code","display_name":"Card security code","score":0.41243425011634827},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3673359155654907},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23405221104621887},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13617092370986938}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7317880392074585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7081518173217773},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.7049771547317505},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.6499677300453186},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6187583804130554},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.6004295349121094},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5326034426689148},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.5153703093528748},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4598572850227356},{"id":"https://openalex.org/C164516710","wikidata":"https://www.wikidata.org/wiki/Q1166072","display_name":"Financial transaction","level":3,"score":0.44199734926223755},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.42101985216140747},{"id":"https://openalex.org/C149071572","wikidata":"https://www.wikidata.org/wiki/Q1035664","display_name":"Card security code","level":4,"score":0.41243425011634827},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3673359155654907},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23405221104621887},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13617092370986938},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005059903870392","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005059903870392","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005059903870392","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005059903870392","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1567409253","https://openalex.org/W2130003699","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W811898883","https://openalex.org/W2417326870","https://openalex.org/W2149402740","https://openalex.org/W2770663761","https://openalex.org/W2753823548","https://openalex.org/W2347767433","https://openalex.org/W100905147","https://openalex.org/W2282718009","https://openalex.org/W2391950365","https://openalex.org/W2405672597"],"abstract_inverted_index":{"Smartphones":[0],"are":[1,29,60,80],"overpowering":[2],"the":[3,102,165,171],"IT":[4],"world":[5],"by":[6,178],"rising":[7],"as":[8,18,32,130],"a":[9,38,98,116,131,138,143,159],"prerequisite":[10],"for":[11,62,74,120],"other":[12],"technologies.":[13],"Emerging":[14],"technology":[15],"paradigms":[16],"such":[17],"Cloud":[19],"computing,":[20],"web":[21],"data":[22],"services,":[23],"online":[24],"banking":[25],"and":[26,40,54,84,134,154,167],"many":[27],"others":[28],"revamping":[30],"them":[31,79],"compatibility":[33],"to":[34,107,141,157],"smartphones.":[35],"Banking":[36],"is":[37],"vital":[39],"critical":[41],"need":[42],"in":[43,93],"daily":[44],"life.":[45],"It":[46,127],"involves":[47],"routine":[48],"financial":[49,161],"transactions":[50],"among":[51],"sellers,":[52],"buyers":[53],"third":[55],"parties.":[56],"Several":[57],"payment":[58,118,139],"protocols":[59],"designed":[61],"mobile":[63],"platforms":[64],"which":[65,96],"involve":[66],"hardware":[67,125],"tokens,":[68],"PIN,":[69],"credit":[70],"cards,":[71],"ATMs":[72],"etc.":[73],"secure":[75,117,160],"transactions.":[76],"Many":[77],"of":[78,105,170],"not":[81],"properly":[82],"verified":[83,176],"have":[85,90,174],"hidden":[86],"flaws.":[87],"Numerous":[88],"vulnerabilities":[89],"been":[91],"found":[92],"existing":[94],"solutions":[95],"raise":[97],"big":[99],"question":[100],"about":[101],"defense":[103],"capability":[104],"smartphones":[106,121],"protect":[108],"user's":[109],"data.":[110],"In":[111],"this":[112],"paper":[113],"we":[114,173],"propose":[115],"protocol":[119,147,172],"without":[122],"using":[123],"any":[124],"token.":[126],"implicates":[128],"bank":[129],"transparent":[132],"entity":[133],"users":[135],"rely":[136],"on":[137],"gateway":[140],"mark":[142],"successful":[144],"transaction.":[145],"Suggested":[146],"uses":[148],"symmetric":[149],"keys,":[150],"Digital":[151],"certificates":[152],"X.509,":[153],"two-factor":[155],"authentication":[156,168],"make":[158],"deal.":[162],"To":[163],"prove":[164],"secrecy":[166],"properties":[169],"formally":[175],"it":[177],"AVISPA.":[179]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
