1 |
J. Zhou and K. Y. Lam, 'Undeniable Billing in Mobile Communication,' Mobicom '98, pp. 284-290, 1998
|
2 |
B. Patel and J. Crowcroft, 'Ticket Based Service Access for the Mobile User,' Mobicom '97, pp. 223-233, 1997
|
3 |
L. Buttyan and J. Hubaux, 'Accountable and Anonymous Access to Services in Mobile Communication Systems,' IEEE Symposium on Reliable Distributed Systems, pp. 384-389, 1999
|
4 |
C. Boyd and A. Mathuria, 'Key Establishment Protocols for Secure Mobile Communications: A Selective Survey,' Information Security and Privacy(ACISP98), LNCS vol. 1438, pp. 344-355, 1998
|
5 |
M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key Distribution Protocol for Digital Mobile Communication Systems,' Advances in Cryptology: Proceedings of Crypto'89, LNCS vol. 435, pp. 324-334, 1989
|
6 |
T. P. Pederson, 'Electronic Payments of Small Accounts,' Security Protocols, LNCS vol. 1361, pp. 59-68, 1997
|
7 |
ETSI, GSM Recommendations: GSM 01.02-12.21 , Feb. 1993
|
8 |
G. Horn and B. Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORlCS '98, LNCS vol. 1485, pp. 277-293, 1998
|
9 |
K. M. Martin, B. Preneel, C. J. Mitchell, H. J. Hitz, G. Horn, A. Poliakova, and P. Howard, 'Secure Billing for Mobile Information Services in UMTS,' IS&N, LNCS vol. 1430, pp. 535-548, 1998
|