메뉴 건너뛰기




Volumn 6, Issue 1, 2004, Pages 35-46

A global ticket-based access scheme for mobile users

Author keywords

E commerce; Mobile service; Signature; Ticket

Indexed keywords

ELECTRONIC COMMERCE; FEES AND CHARGES; INTERNET; QUALITY OF SERVICE; RADIO INTERFERENCE; SECURITY OF DATA;

EID: 1142273007     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:ISFI.0000015873.35795.5e     Document Type: Article
Times cited : (17)

References (24)
  • 3
    • 0033313663 scopus 로고    scopus 로고
    • Accountable anonymous access to services in mobile communication systems
    • Buttyan L, Hubaux J. Accountable anonymous access to services in mobile communication systems. In: Symposium on Reliable Distributed Systems, 1999:384-389.
    • (1999) Symposium on Reliable Distributed Systems , pp. 384-389
    • Buttyan, L.1    Hubaux, J.2
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communication of the ACM, 1981; 24(2):84-88.
    • (1981) Communication of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 3543127731 scopus 로고    scopus 로고
    • Excellent E-service. http://www.excellenteservice.com, 2002.
    • (2002)
  • 7
    • 84958780603 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • Quisquater J. et al. eds. Lecture Notes in Computer Science, Springer-Verlag
    • Horn G, Preneel B. Authentication and payment in future mobile systems. In: Quisquater J. et al. eds. Proceedings European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Springer-Verlag, 1998;1485:277-293.
    • (1998) Proceedings European Symposium on Research in Computer Security , vol.1485 , pp. 277-293
    • Horn, G.1    Preneel, B.2
  • 11
    • 24944561275 scopus 로고    scopus 로고
    • Configured replication for mobile applications
    • Lubinski A, Heuer A. Configured replication for mobile applications. Rostocker Informatik Berichte, 2000; 24:101-112.
    • (2000) Rostocker Informatik Berichte , vol.24 , pp. 101-112
    • Lubinski, A.1    Heuer, A.2
  • 14
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the GSM system and some proposed future improvements
    • Mehrotra A, Golding L. Mobility and security management in the GSM system and some proposed future improvements. In: Proceedings of IEEE, 1998; 86(7).
    • (1998) Proceedings of IEEE , vol.86 , Issue.7
    • Mehrotra, A.1    Golding, L.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-Key cryptosystems
    • Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-Key cryptosystems. Communication of the ACM, 1978;21(2):120-126.
    • (1978) Communication of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 19
    • 22644452167 scopus 로고    scopus 로고
    • Anonymous authentication of membership in dynamic groups
    • Anguilla: British West Indies, February
    • Schechter S, Parnell T, Hartemink A. Anonymous Authentication of Membership in Dynamic Groups. In: Financial Cryptography '99, Anguilla: British West Indies, February 1999.
    • (1999) Financial Cryptography '99
    • Schechter, S.1    Parnell, T.2    Hartemink, A.3
  • 21
    • 0348151886 scopus 로고
    • Better login protocols for computer networks
    • Vandewalle J. ed., Lecture Notes in Computer Science, Toulouse, France, Springer-Verlag
    • Waleffe DD, Quisquater JJ. Better login protocols for computer networks. In: Vandewalle J. ed., Proceedings European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Toulouse, France, Springer-Verlag, 1990.
    • (1990) Proceedings European Symposium on Research in Computer Security
    • Waleffe, D.D.1    Quisquater, J.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.