A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is
Through the combination of the public-key digital signature and the hash-chaining techniques, a new set of authentication protocols is proposed with the capability of arbitrating disputed bills. These protocols provide security services required by regular authentication protocols and are efficient in consideration of the specific Personal Communication Systems (PCS) environment. They protect subscribers from incorrect service charges and provide service providers legal evidences to collectdoi:10.1109/4234.781006 fatcat:i5bxwx363ndofld6vao2l4odpe