A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is
In this paper, a framework of authentication and undeniable billing support for an agentbased roaming service in WLAN/cellular networks interworking networks is proposed. ... Within the framework, an adaptive authentication and an event-tracking scheme have been developed, which allow the application of undeniable billing service to cellular network even when it still uses ... Dual directional hash chain setup at MT In the proposed framework, the DDHC is modified to suite the particular use for billing support in mobile communications environment. ...doi:10.1016/j.comnet.2008.02.012 fatcat:n7ah5s6ehjb3fnggf6fe4lw6s4
Secure Information Networks
proposals for future mobile communication systems. ... Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mobile communication industry standards, such as DAMPS, GSM, and TETRA, and several ... The new protocol uses it to implement the undeniable billing in the foUowing way. ...doi:10.1007/978-0-387-35568-9_15 fatcat:u2lc4euylfdojhvtfain3qrgky
Rural communities may wish to use mobile clinics. CONCLUSION.—this program is not revolu- tionary: it is evolutionary. ... It can be put into action when the leadership of American Dentistry is met with equal leadership in government—in the community, in the state and in the nation. ...
opportunity to enable mobile devices as a universal payment method, involving in daily financial transactions. ... Unfortunately, designing a secure mobile payment schemes is more challenging than wired payment protocol due to the constraints of wireless network and mobile devices. ... One example is Mobile Visa Wave payment, which was launched in Malaysia on 2006 in collaboration with Maybank, Maxis Communications Berhad (Maxis) and Nokia. ...doi:10.7763/jacn.2013.v1.65 fatcat:m5eok5a6wnc43hm3qwjbkevzwe
A report is submitted by each node to a trusted party after the communication. Based on the consistency of the report the payment is cleared. ... In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks. ... In both cases, the foreign WISP reports the accounting information of the roaming MU to its home WISP at the completion of the session, by which the home WISP will pay the bill and then charge the MU in ...doi:10.9790/0661-16263843 fatcat:ib4v3mig45hs7ahkg2hqghfngy
The Merchant's Magazine and Commercial Review
of every member of the commercial community are generally known.” ... The truth of these remarks is undeniable, and the question recurs: How are these things to be accounted for? ...
As a consequence, we are ill prepared to codperate in a supremely important joint enterprise of economic mobilization. ... No. 1} THE NEXT TAX BILL 9 proposed repeal of the capital stock and declared excess profits tax is commendable. ...
Mobile phone holds the great importance in everyday life. Mobile phone and internet usage have become universal practice especially among the student community. ... There is need to reduce mobile phone usage, switch off / silent mobiles during sleep time, avoid during driving and should be monitored mobile usage in adolescents. ... ACKNOWLEDGEMENTS Authors express sincere gratitude to 6th Term medical students namely Twinkle Ashar, Amruta Bache, Ankhi Chakraborty, Aishwarya Desai, Utkarsha Dethe for helping in data collection for ...doi:10.18203/2394-6040.ijcmph20170263 fatcat:ikvs6qt2dra5jh2bqutfkj6i6m
The Journal of the Korea Contents Association
무선망 보안 접속을 위한 효율적인 인증 기법
무선망 보안 접속을 위한 효율적인 인증 기법
In this paper, a novel authentication method is presented so that a mobile mesh node can be effectively authenticated and obtain an secure connection in foreign domains. ... without a connectivity to the home domain, the foreign domain can provide an effective authentication of a mesh node by consulting one of the neighboring foreign domains that has been visited by the mobile ... such as Global System for Mobile Communications (GSM) , Personal Communication Systems (PCS)  and Mobile IP networks. ...doi:10.5392/jkca.2011.11.9.017 fatcat:inz34zae3bgu3ocsdqifl72fru
The Global System for Mobile Communication (GSM) is a popular mobile communication standard. GSM networks collect personal communication information required for the billing of its subscribers. ... This paper discusses, from a technical perspective, the network components involved when conducting a mobile forensic analysis, and how these aspects are influenced by a forensic investigation in a GSM ... Stored network communication information describing network events, for the sole purpose of billing its subscribers, may also play a critical role in an investigation. ...doi:10.1016/j.diin.2010.01.002 fatcat:syjealhg6jbd3ff5n7vfdfvqwi
Our model provides for the unlinkability of consumers as well as for the undeniability and unforgeability of billing information using digital signatures and identity federations. ... Even if a consumer uses an outlet managed by another person, one bill for both indoor and outdoor charging information should be required to the consumer in their contract with the utility company. ... In this study, we assume a secure communication channel. A secure communication channel is not eavesdropped and falsified by any third party. ...doi:10.2197/ipsjjip.25.12 fatcat:uggaiym5hbh2rcrffrxo36c2bm
The Historical Journal
Peel was well aware of the potential consequences for his bill of the reformers’ efforts to mobilize opinion against the forgery laws. ... that in a large class of the community, and especially the mercantile portion of it, religious views and moral feelings mixed themselves, so as to make the repugnance altogether invincible. ...
In the history of mobile phone communication, we have seen countless unsettled disputes where the mobile user disagrees with the telecom company either on the calling time or on the duration, or even on ... In this paper, a provable billing protocol will be presented that can effectively solve disagreements between the two parties. ... Afterward Li et al. proposed an undeniable mobile billing scheme. ...doi:10.1007/s11277-009-9818-9 fatcat:fcszyg3yvnh27grwqysuyrogau
; the phase of mobile communications providing high quality connections for transportable devices. ... The constantly intensifying demand for mobility has generated enormous market opportunities for telecom companies. ... to a newer and higher level (Oscar, 2008; June et al., 2005) . 4G is an expression employed to illustrate the next elevation of advancement in the field of mobile communications (MCs) and it is also ...doi:10.22610/imbr.v5i2.1027 fatcat:uezwxpxbzvhtbdrwbdf64v3hbm
Lecture Notes in Computer Science
In particular, a secure billing scheme for value-added information services using micropayments is presented. ... This paper presents solutions developed in the ACTS ASPeCT project for advanced security features in UMTS. ... Personal mobile communicators will integrate the functions of a mobile phone, and of a laptop or palmtop personal computer. ...doi:10.1007/bfb0056997 fatcat:u5vbpiz5fjea5jje2czh72rkeq
« Previous Showing results 1 — 15 out of 11,082 results