메뉴 건너뛰기




Volumn , Issue , 2007, Pages 139-146

A privacy enhancing service architecture for ticket-based mobile applications

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; MATHEMATICAL MODELS; MOBILE DEVICES; USER INTERFACES;

EID: 34548186481     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.16     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 35048827965 scopus 로고    scopus 로고
    • Ticket-based access scheme for mobile users
    • Conferences in Research and Practice in Information Technology
    • H. Wang, J. Cao and Y. Zhang, Ticket-based access scheme for mobile users, Twenty-Fifth Australian Computer Science Conference (ACSC2002), Conferences in Research and Practice in Information Technology, Vol. 4, 2002.
    • (2002) Twenty-Fifth Australian Computer Science Conference (ACSC2002) , vol.4
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 2
    • 34548157765 scopus 로고    scopus 로고
    • Ticket based Authentication and Payment Protocol for Mobile Telecommunications Systems
    • B.-R. Lee, T.-Y. Kim, S.-S. Kang, Ticket based Authentication and Payment Protocol for Mobile Telecommunications Systems, IEEE Computer Society, prdc, p.218, 2001.
    • (2001) IEEE Computer Society, prdc , pp. 218
    • Lee, B.-R.1    Kim, T.-Y.2    Kang, S.-S.3
  • 3
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport, Password Authentication with Insecure Communication, Communications of the ACM, Vol. 24(11), pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 4
    • 34548156014 scopus 로고    scopus 로고
    • T. Rodden, A. Friday, H. Mller, A. Dix, A Leightweight Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol, 2002.
    • T. Rodden, A. Friday, H. Mller, A. Dix, A Leightweight Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol, 2002.
  • 5
    • 0033313663 scopus 로고    scopus 로고
    • Accountable Anonymous Access to Services in Mobile Communication Systems
    • L. Buttyn, J.-P. Hubaux, Accountable Anonymous Access to Services in Mobile Communication Systems, IEEE Computer Science, srds, p. 384, 1999.
    • (1999) IEEE Computer Science, srds , pp. 384
    • Buttyn, L.1    Hubaux, J.-P.2
  • 11
    • 79953067606 scopus 로고    scopus 로고
    • Secure hash standards (SHS)
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, Secure hash standards (SHS), Federal Information Processing Standards Publication 180-2, 2002.
    • (2002) Federal Information Processing Standards Publication , vol.180 -2
  • 12
    • 27544477491 scopus 로고    scopus 로고
    • I.A. Junglas, C. Spitzmller, A Research Model for Studying Privacy Concerns Pertaining to LocationBased Services, Proceedings of the 38th Hawaii International Conference on System Sciences, HICSS05, Jan, 2005.
    • I.A. Junglas, C. Spitzmller, A Research Model for Studying Privacy Concerns Pertaining to LocationBased Services, Proceedings of the 38th Hawaii International Conference on System Sciences, HICSS05, Jan, 2005.
  • 16
    • 34548182325 scopus 로고    scopus 로고
    • Network of Excellence in Cryptology, Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1, 17 February 2005, URL: http://www.ecrypt.eu.org/documents/STVL-ERICS-2-HASH_STMT-1.1.pdf
    • Network of Excellence in Cryptology, "Recent Collision Attacks on Hash Functions: ECRYPT Position Paper". Revision 1.1, 17 February 2005, URL: http://www.ecrypt.eu.org/documents/STVL-ERICS-2-HASH_STMT-1.1.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.