Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Solving Fair Exchange with Mobile Agents
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Non-Repudiation in An Agent-Based Electronic Commerce System
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
Agent-Based Control for Networked Traffic Management Systems
IEEE Intelligent Systems
MASACAD: A Multiagent-Based Approach to Information Customization
IEEE Intelligent Systems
Automated ontology construction for unstructured text documents
Data & Knowledge Engineering
Ontology-based intelligent healthcare agent and its application to respiratory waveform recognition
Expert Systems with Applications: An International Journal
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
A genetic fuzzy agent using ontology model for meeting scheduling system
Information Sciences: an International Journal
Host revocation authority: a way of protecting mobile agents from malicious hosts
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Software agents and market (in) efficiency: a human trader experiment
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A fuzzy ontology and its application to news summarization
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
A survey on mobile digital signature models
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that B and S cannot repudiate sending and receiving the purchase order respectively. The buyer generates a mobile agent which carries encrypted purchase order to the seller. This mobile agent is also issued a proxy certificate by the buyer; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. One advantage of this agent-based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile payments.