11,082 Hits in 2.6 sec

User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks

Minghui Shi, Xuemin (Sherman) Shen, Jon W. Mark, Dongmei Zhao, Yixin Jiang
2008 Computer Networks  
In this paper, a framework of authentication and undeniable billing support for an agentbased roaming service in WLAN/cellular networks interworking networks is proposed.  ...  Within the framework, an adaptive authentication and an event-tracking scheme have been developed, which allow the application of undeniable billing service to cellular network even when it still uses  ...  Dual directional hash chain setup at MT In the proposed framework, the DDHC is modified to suite the particular use for billing support in mobile communications environment.  ... 
doi:10.1016/j.comnet.2008.02.012 fatcat:n7ah5s6ehjb3fnggf6fe4lw6s4

A New Authentication Protocol for Portable Communication Systems [chapter]

Sheng-bo Xu, Cees Jansen, Henk Tilborg
1999 Secure Information Networks  
proposals for future mobile communication systems.  ...  Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mobile communication industry standards, such as DAMPS, GSM, and TETRA, and several  ...  The new protocol uses it to implement the undeniable billing in the foUowing way.  ... 
doi:10.1007/978-0-387-35568-9_15 fatcat:u2lc4euylfdojhvtfain3qrgky

Page 501 of American Dental Association. The Journal of the American Dental Association Vol. 32, Issue 7 [page]

1945 American Dental Association. The Journal of the American Dental Association  
Rural communities may wish to use mobile clinics. CONCLUSION.—this program is not revolu- tionary: it is evolutionary.  ...  It can be put into action when the leadership of American Dentistry is met with equal leadership in government—in the community, in the state and in the nation.  ... 

Review of Mobile Macro-Payment Schemes

Tan Soo Fun, Leau Yu Beng, Mohd Norhisham Razali
2014 Journal of Advances in Computer Networks  
opportunity to enable mobile devices as a universal payment method, involving in daily financial transactions.  ...  Unfortunately, designing a secure mobile payment schemes is more challenging than wired payment protocol due to the constraints of wireless network and mobile devices.  ...  One example is Mobile Visa Wave payment, which was launched in Malaysia on 2006 in collaboration with Maybank, Maxis Communications Berhad (Maxis) and Nokia.  ... 
doi:10.7763/jacn.2013.v1.65 fatcat:m5eok5a6wnc43hm3qwjbkevzwe

Trust Based Secure Payment Scheme for Multi-hop Wireless Networks

Mrs. Chinchu V. S, Ms. Meji Jose
2014 IOSR Journal of Computer Engineering  
A report is submitted by each node to a trusted party after the communication. Based on the consistency of the report the payment is cleared.  ...  In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks.  ...  In both cases, the foreign WISP reports the accounting information of the roaming MU to its home WISP at the completion of the session, by which the home WISP will pay the bill and then charge the MU in  ... 
doi:10.9790/0661-16263843 fatcat:ib4v3mig45hs7ahkg2hqghfngy

Page 417 of The Merchant's Magazine and Commercial Review Vol. 13, Issue 5 [page]

1845 The Merchant's Magazine and Commercial Review  
of every member of the commercial community are generally known.”  ...  The truth of these remarks is undeniable, and the question recurs: How are these things to be accounted for?  ... 

Page 9 of Academy of Political Science. Proceedings of the Academy of Political Science Vol. 20, Issue 1 [page]

1942 Academy of Political Science. Proceedings of the Academy of Political Science  
As a consequence, we are ill prepared to codperate in a supremely important joint enterprise of economic mobilization.  ...  No. 1} THE NEXT TAX BILL 9 proposed repeal of the capital stock and declared excess profits tax is commendable.  ... 

Study of mobile phone usage in medical students of deemed university of Western Maharashtra, India

Jeevankumar U. Yadav, Deepmala J. Yadav
2017 International Journal of Community Medicine and Public Health  
Mobile phone holds the great importance in everyday life. Mobile phone and internet usage have become universal practice especially among the student community.  ...  There is need to reduce mobile phone usage, switch off / silent mobiles during sleep time, avoid during driving and should be monitored mobile usage in adolescents.  ...  ACKNOWLEDGEMENTS Authors express sincere gratitude to 6th Term medical students namely Twinkle Ashar, Amruta Bache, Ankhi Chakraborty, Aishwarya Desai, Utkarsha Dethe for helping in data collection for  ... 
doi:10.18203/2394-6040.ijcmph20170263 fatcat:ikvs6qt2dra5jh2bqutfkj6i6m

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks
무선망 보안 접속을 위한 효율적인 인증 기법

Ung Heo, Yu-Shan He, Kang-Soo You, Jae-Ho Choi
2011 The Journal of the Korea Contents Association  
In this paper, a novel authentication method is presented so that a mobile mesh node can be effectively authenticated and obtain an secure connection in foreign domains.  ...  without a connectivity to the home domain, the foreign domain can provide an effective authentication of a mesh node by consulting one of the neighboring foreign domains that has been visited by the mobile  ...  such as Global System for Mobile Communications (GSM) [8], Personal Communication Systems (PCS) [9] and Mobile IP networks[10].  ... 
doi:10.5392/jkca.2011.11.9.017 fatcat:inz34zae3bgu3ocsdqifl72fru

Sequenced release of privacy-accurate information in a forensic investigation

N.J. Croft, M.S. Olivier
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The Global System for Mobile Communication (GSM) is a popular mobile communication standard. GSM networks collect personal communication information required for the billing of its subscribers.  ...  This paper discusses, from a technical perspective, the network components involved when conducting a mobile forensic analysis, and how these aspects are influenced by a forensic investigation in a GSM  ...  Stored network communication information describing network events, for the sole purpose of billing its subscribers, may also play a critical role in an investigation.  ... 
doi:10.1016/j.diin.2010.01.002 fatcat:syjealhg6jbd3ff5n7vfdfvqwi

SPaCIS: Secure Payment Protocol for Charging Information over Smart Grid

Hikaru Kishimoto, Naoto Yanai, Shingo Okamura
2017 Journal of Information Processing  
Our model provides for the unlinkability of consumers as well as for the undeniability and unforgeability of billing information using digital signatures and identity federations.  ...  Even if a consumer uses an outlet managed by another person, one bill for both indoor and outdoor charging information should be required to the consumer in their contract with the utility company.  ...  In this study, we assume a secure communication channel. A secure communication channel is not eavesdropped and falsified by any third party.  ... 
doi:10.2197/ipsjjip.25.12 fatcat:uggaiym5hbh2rcrffrxo36c2bm

Page 697 of The Historical Journal Vol. 48, Issue 3 [page]

2005 The Historical Journal  
Peel was well aware of the potential consequences for his bill of the reformers’ efforts to mobilize opinion against the forgery laws.  ...  that in a large class of the community, and especially the mercantile portion of it, religious views and moral feelings mixed themselves, so as to make the repugnance altogether invincible.  ... 

A Provable Billing Protocol on the Current UMTS

Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan
2009 Wireless personal communications  
In the history of mobile phone communication, we have seen countless unsettled disputes where the mobile user disagrees with the telecom company either on the calling time or on the duration, or even on  ...  In this paper, a provable billing protocol will be presented that can effectively solve disagreements between the two parties.  ...  Afterward Li et al. proposed an undeniable mobile billing scheme.  ... 
doi:10.1007/s11277-009-9818-9 fatcat:fcszyg3yvnh27grwqysuyrogau

Joining the New Band: Factors Triggering the Intentions of Malaysian College and University Students to Adopt 4G Broadband

Wong Lai Soon, Bobby Chai Boon Hui ., Wong Kee Luen .
2013 Information Management and Business Review  
; the phase of mobile communications providing high quality connections for transportable devices.  ...  The constantly intensifying demand for mobility has generated enormous market opportunities for telecom companies.  ...  to a newer and higher level (Oscar, 2008; June et al., 2005) . 4G is an expression employed to illustrate the next elevation of advancement in the field of mobile communications (MCs) and it is also  ... 
doi:10.22610/imbr.v5i2.1027 fatcat:uezwxpxbzvhtbdrwbdf64v3hbm

Secure billing for mobile information services in UMTS [chapter]

K. M. Martin, B. Preneel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova, P. Howard
1998 Lecture Notes in Computer Science  
In particular, a secure billing scheme for value-added information services using micropayments is presented.  ...  This paper presents solutions developed in the ACTS ASPeCT project for advanced security features in UMTS.  ...  Personal mobile communicators will integrate the functions of a mobile phone, and of a laptop or palmtop personal computer.  ... 
doi:10.1007/bfb0056997 fatcat:u5vbpiz5fjea5jje2czh72rkeq
« Previous Showing results 1 — 15 out of 11,082 results