Ticket based service access for the mobile user
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Untraceable off-line electronic cash flow in e-commerce
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Security Issues in Mobile Database Access
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Electronic Payment in Mobile Environment
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
Secure Billing for Mobile Information Services in UMTS
IS&N '98 Proceedings of the 5th International Conference on Intelligence and Services in Networks: Technology for Ubiquitous Telecom Services
A SET Based Approach to Secure the Payment in Mobile Commerce
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Achieving user privacy in mobile networks
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A Secure Account-Based Mobile Payment Protocol
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Anonymous access scheme for electronic-services
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Authentication and payment in future mobile systems
Journal of Computer Security
On the exact security of multi-signature schemes based on RSA
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Achieving secure and flexible M-services through tickets
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
Mobile services have been growing fast to facilitate business in wireless network environment. It is both critical and challenging to maintain security and anonymity so as to provide high quality services. In this paper, we propose a ticket-based architecture and a generic protocol for controlling access to mobile services. Our protocol has the following properties. First, it is a generic solution independent of cryptographic algorithms and service models. Second, it is secure against various malicious attacks on mobile services. Third, it provides identity anonymity for customers and/or service providers depending on business requirements. Fourth, it is flexible in dynamic environments where customers and/or service providers are cross multiple domains. We also show an efficient implementation option of this generic protocol based on elliptic curve digital signature algorithm.