CRYPTO '88 Proceedings on Advances in cryptology
Value exchange systems enabling security and unobservability
Computers and Security
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Fairness in electronic commerce
Fairness in electronic commerce
ACM Transactions on Computer Systems (TOCS)
Gradual and Verifiable Release of a Secret
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Rational Exchange - A Formal Model Based on Game Theory
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Using Smart Cards for Fair Exchange
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Solving Fair Exchange with Mobile Agents
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Modular Fair Exchange Protocols for Electronic Commerce
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Equilibrium analysis of the possibilities of unenforced exchange in multiagent systems
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Practical and efficient fair document exchange over networks
Journal of Network and Computer Applications
A review for mobile commerce research and applications
Decision Support Systems
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
A secure protocol for misbehavior-penalization-based fair digital signature exchange
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A Fair Mobile Payment Protocol
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
An optimistic NBAC-Based fair exchange method for arbitrary items
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
P2P digital value fair trading system using smart cards
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Gracefully degrading fair exchange with security modules
EDCC'05 Proceedings of the 5th European conference on Dependable Computing
Hi-index | 0.00 |
Mobile commerce over the Internet always includes the exchange of electronic goods. Fair exchange protocols establish fairness and ensure that both participants can engage in the exchange without the risk of suffering a disadvantage (e.g., losing their money without receiving anything for it). In general, fair exchange protocols require the continuous availability of an external trusted third party (TTP), a dedicated site which is trusted by both participants. Implementations of TTPs for fair exchange have been proposed to be based on carefully secured Internet hosts in order to establish trust. In this paper we present solutions to the fair exchange problem in mobile environments, where customers frequently disconnect from the network and thus continuous availability of the external TTP is not given. Our approach utilizes tamper-poof hardware on the customer's side partly taking over the duties of the TTP. Besides supporting disconnected operations our approach also allows the proper handling of time-sensitive items (i.e., items which lose value over time), a feature which previous protocols lack.