CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Journal of Computer Security
Business models and transactions in mobile electronic commerce: requirements and properties
Computer Networks: The International Journal of Computer and Telecommunications Networking
A service management framework for M-commerce applications
Mobile Networks and Applications
A voice and ink XML multimodal architecture for mobile e-commerce systems
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
A semantic web environment for context-aware m-commerce
Proceedings of the 4th ACM conference on Electronic commerce
Transaction Management for M-Commerce at a Mobile Terminal
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 3 - Volume 3
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Generating Digital Signatures on Mobile Devices
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Highly personalized information delivery to mobile clients
Wireless Networks - Special issue: Pervasive computing and communications
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Improved server assisted signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
A lightweight identity authentication protocol for wireless networks
Computer Communications
A survey on mobile digital signature models
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
Mobile communications offer a wide variety of services to people. All mobile subscribers can use a mobile device to access various resources and conduct their business anytime from anywhere. This feature has contributed greatly to the rapid development of mobile commerce. In fact, the Personal Trusted Device (PTD, such as PDA or mobile phone) lacks of computing resources has become a problem in mobile commerce development. In this paper, we overcome the limited computation power of mobile device and involve a trusted proxy server to coordinate transactions such that the important computation requirements can still be accomplished. In this paper, we propose a server-aided signature scheme for mobile commerce. We base on the Diffie et al. scheme and involve the one-time password mechanism to establish session key in advance, and then download the initial parameters into the mobile devices as the communication parameters between the mobile user and the proxy server. The proposed scheme satisfies the issues of security, non-repudiation, fairness, anonymity, simplicity, and mobility.