Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.5.575

Design and Implementation of Digital Contract System on the Mobile Environment : M-XContract  

Hwang, Ki-Tae (한성대학교 컴퓨터공학부)
Kim, Nam-Yun (한성대학교 정보공학부)
Abstract
Due to hardware resource limit and system incompatibility of the mobile device, and low bandwidth of wireless communication, there are a few difficulties in introducing the digital contract system based on wired communication to M-Commerce. To get over the difficulties, this paper defines a digital contract based upon XML and then addresses the design and implementation of M-XContract, a digital contract system for the mobile environment. M-XContract system has been constructed with the digital contract server, M-ESign module which contracts with the customer on the PDA and transfers the contract digitally signed to the server, M-EDecoder module which shows the contract to the customer from the server, and X-Auth which is a contract authoring tool. To evaluate the run-time performance of the M-XContract, we measured the digital signature generation time and transfer time to the server. The evaluation results show that the M-Xcontract is an efficient model for the mobile contract system.
Keywords
Digital Signature; Mobile; XML; PKI; Digital Contract; M-Commerce;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Bettstetter, H. Vogel and J. Eberspacher, 'General Packet Radio Service GPRS : Architecture, Protocols, and Air Interface,' IEEE Communications Surveys 2(3), 1999
2 S. Burnett and S. Paine, RSA Security's Official Guide to CryptoGraphy, RSA Press, 2001
3 M. Branchaud, 'A Survey of Public-Key Infrastructures,' Master's thesis, McGill University, 1997
4 R. Housley, Cryptographic Message Syntax, RFC 2630, Internet Society, 1999
5 U. Varshney and R. Vetter, 'A Framework for the Emerging Mobile Commerce Applications,' Proceedings of the 34th Hawaii International Conference on System Sciences, 2000
6 M. Myers, R. Ankney, etc., Internet X.509 Public Key Infrastructure : Online Certificate Status Protocol-OCSP, RFC 2560, IETF, 1999
7 James A. Senn, 'The Emergence of M-Commerce,' IEEE Computer, December, 2000   DOI   ScienceOn
8 R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, 1992
9 FIPS 180-1, Secure Hash Standards,' Federal Information Processing Standards Publication;U.S. Department of Commerce/NIST, 1995
10 R. Housley, W. Polk, W. Ford and D. Solo, Internet X.509 Public Key Infrastructure : Certificate and CRL Profile. RFC 2459, IETF, 1999
11 W3C, Extensible Markup Language(XML) 1.0 Technical report, http://www.w3.org/TR/1998/REC-xml-19980210, 1998
12 한국정보보호진흥원, 무선 PKI 기술 규격, http://www.kisa.or.kr, 2001
13 M. Heijden and M. Taylor, Understanding WAP : Wireless Application, Devices, and Services, Artech House, 2000
14 A. Jurisic and A. J. Menezes, 'Elliptic Curves and Cryptography,' Dobb's Journal, April, 1997
15 전병선, Microsoft Visual C++ 6.0 ATL COM Programming, 삼양출판사, 1999