Journal of Network and Computer Applications
Properties of secure transaction protocols
Selected papers of the 8th joint European conference on Networking
Achieving non-repudiation of Web based transactions
Journal of Systems and Software
Business models and transactions in mobile electronic commerce: requirements and properties
Computer Networks: The International Journal of Computer and Telecommunications Networking
E-Commerce: Business. Technology. Society.
E-Commerce: Business. Technology. Society.
The Challenges of Mobile Computing
Computer
Mobile Commerce: Vision and Challenges (Location and its Management)
SAINT '02 Proceedings of the 2002 Symposium on Applications and the Internet
Observations on Non-repudiation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Security Issues In An Edi Environment
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
COPS: A Model and Infrastructure for Secure and Fair Electronic Markets
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8 - Volume 8
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A security and usability proposal for mobile electronic commerce
IEEE Communications Magazine
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
A Provable Billing Protocol on the Current UMTS
Wireless Personal Communications: An International Journal
Undeniable mobile billing schemes
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
All mobile phone subscribers must pay a subscription fee to enjoy the convenience of this technology. Subscribers pay for the actual time spent talking on the cellular phone. Generally, there are two kinds of billing. With prepaid service, the subscriber buys a prepaid card and pays for the cellular phone service in advance. As the subscriber uses airtime the cellular phone account is debited the appropriate amount of cellular phone service used. When the subscriber runs out of dollars in the cellular phone account, they can no longer call until the account is prepaid for additional cellular phone service or airtime. With postpaid service, cellular carriers bill customers based on how many minutes of airtime they use each month. When the customer places a call on an activated cellular phone, each minute the phone is connected is counted. Cellular carriers bill the customer on a monthly basis for the airtime used. There are some issues worth discussing such as fairness, non-repudiation, and non-usurpation. In this paper we propose a fair and secure mobile billing system. We introduce the ''observer'' concept to supervise billing to make it more objective and accepted by both cellular carriers and subscribers. The proposed scheme can detect illegal phone calls in real time and the subscriber cannot deny the deserved fees.