Password authentication with insecure communication
Communications of the ACM
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
CNSR '05 Proceedings of the 3rd Annual Communication Networks and Services Research Conference
Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
NWESP '05 Proceedings of the International Conference on Next Generation Web Services Practices
A New Scheme for the Electronic Coin
ICEBE '06 Proceedings of the IEEE International Conference on e-Business Engineering
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences: an International Journal
Implementing regular cash with blind fixed-value electronic coins
Computer Standards & Interfaces
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Measuring mobile banking customers' channel attribute preferences in service consumption
International Journal of Mobile Communications
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
A novel efficient conference scheme for mobile communications
International Journal of Mobile Communications
Evaluating mobile banking portals
International Journal of Mobile Communications
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
A traceable E-cash transfer system against blackmail via subliminal channel
Electronic Commerce Research and Applications
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Due to the rapid development of mobile communication technologies, several applications are proposed on the mobile devices. We present a novel and low-computation E-cash transfer system to prevent blackmail for mobile communications. Our proposed protocol is based on a session key with mutual authentication, a digital signature and a public key system. In our system, the problematic account designated by the criminal is able to be traced under the blackmail.