Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Solving Fair Exchange with Mobile Agents
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Non-Repudiation in An Agent-Based Electronic Commerce System
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
Agent-Based Control for Networked Traffic Management Systems
IEEE Intelligent Systems
MASACAD: A Multiagent-Based Approach to Information Customization
IEEE Intelligent Systems
Host revocation authority: a way of protecting mobile agents from malicious hosts
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A fair non-repudiation protocol
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
Hi-index | 12.05 |
Non-repudiation of a mobile digital rights management (DRM) ensures that when a user (U) sends some message to a rights issuer (RI), neither U nor RI can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that U and RI cannot repudiate sending and receiving the message respectively. U generates a mobile agent which carries encrypted payment information to RI. This mobile agent is also issued a proxy certificate by U; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. One advantage of this agent-based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile DRM.