|
[AAZM2004] Wael Adi, Ali Al-Qayedi, Abdulkarim Al Zarooni, and Ali Mabrouk, "Secured Multi-Identity Mobile Infrastructure and Offline Mobile-Assisted Micro-Payment Application", IEEE Wireless Communications and Networking Conference, 2004, pp.879-882. [AMSW97] Bob Askwith, Madjid Merabti, Qi Shi, and Keith Whiteley, "Achieving User Privacy in Mobile Networks", Proceedings of the 13th Annual Computer Security Applications Conference, pp.108, December 08-12, 1997. [Boy89] Colin Boyd, "Digital Multisignatures", Cryptography and Coding, 1989. [Cha82] David Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Crypto, Plenum Press, 1982. [CK2003] Su-Gil Choi and Kwang-Jo Kim, "Authentication and Payment Protocol Preserving Location Privacy in Mobile IP", IEEE Global Communications Conference, San Francisco, USA, 2003. [DZ2003] Yuan-Jun Dai and Li-He Zhang, "A Security Payment Scheme of Mobile-eCommerce", International Conference on Communication Technology, China, 2003. [DH76] Whitfield Diffie and Martin E. Hellman, "New directions in cryptography", Information Theory, IEEE Transactions on, Volume: 22, Issue: 6, Nov 1976 Pages: 644 – 654. [EP2003] Geoffrey Elliott and Nigel Phillips, "Mobile Commerce and Wireless Computing System", 2003, Addison-Wesley, USA. [FJP96] Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann, "MIXes in Mobile Communication Systems: Location Management with Privacy", Proc. Workshop on Information Hiding, Cambridge (UK), Univ. of Cambridge, Isaac Newton Institute, 30. 5. -1. 6. 96. [Gin2002] S Gindraux, "From 2G to 3G: a guide to mobile security", 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489) , 8-10 May 2002 Pages: 308 – 311. [HHMK99] Lawrence Harte, Morris Hoenig, Daniel McLaughlin, and Roman Kikta, "CDMA IS-95 for Cellular and PCS Technology Applications and Resource Guide", McGraw-Hill, USA, 1999. [KALNN98] Heikki Kaaranen, Ari Ahtiainen, Lauri Laitinen, Siamak Naghian, and Valtteri Niemi, "UMTS Networks Architecture, Mobility and Services", John Wiley & Sons Ltd., USA, 1998. [KOK98] Jungjoon Kim, Mina Oh, and Taegun Kim, "Security requirements of next generation wireless communications", Communication Technology Proceedings 1998, ICCT '98, 1998 International Conference on, 22-24 Oct. 1998 Pages:6 pp. vol.1. [LHY99] Chii-Hwa Lee, Min-Shiang Hwang, and Wei-Pang Yang, "Enhanced privacy and authentication for the global system for mobile communications", Wireless Network pp. 231 - 243, 1999. [LKK2001] Byung-Rae Lee, Tai-Yun Kim, and Sang-Seung Kang, "Ticket based Authentication and Payment Protocol for Mobile Telecommunications Systems", Pacific Rim International Symposium on Dependable Computing, Seoul, Korea, 2001. [MP2002] Merritt Maxin and David Pollino, "Wireless Security", McGraw-Hill, INC., 2002. [Min2003] Robert P. Minch, "Privacy issues in location-aware mobile devices", System Sciences 2004, Proceedings of the 37th Annual Hawaii International Conference on, 5-8 Jan. 2004 Pages: 127 – 136. [PHE2002] Sang Yun Park, Moon Seog Han, and Young Ik Eom, "An Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments", IEEE 5th International Conference on High Speed Networks and Multimedia Communications (HSNMC2002), Cheju Island, Jul. 3-5 2002, pp. 332-337. [RS2000] Gopal Racherla and Debashis Saha, "Security and privacy issues in wireless and mobile computing", Personal Wireless Communications, 2000 IEEE International Conference on , 17-20 Dec. 2000 Pages:509 – 513. [RWO95] Siegmund M. Redl, Matthias K. Weber, and Malcolm W. Oliphant, "An Introduction to GSM", Artech House Inc., 1995. [RWO98] Siegmund M. Redl, Matthias K. Weber, and Malcolm W. Oliphant, "GSM and Personal Communications Handbook", Artech House Inc., 1998. [Rhe98] Man Young Rhee, "CDMA Cellular Mobile Communications and Network Security", Prentice Hall, USA, 1998. [SM94] Didier Samfat and Refik Molva, "A method providing identity privacy to mobile users during authentication", Mobile Computing Systems and Applications 1994, Proceedings, Workshop on, 8-9 Dec. 1994 Pages: 196 – 199. [SK2002] S. Schwiderski-Grosche and H. Knospe, "Secure mobile commerce", Electronics and Communication Engineering Journal, 2002, vol.14, pp.228-238. [SPC95] Markus Stadler, Jean-Marc Piveteau, and Jan Camenisch, "Fair Blind Signatures", Advances in Cryptology EUROCRYPT '95, vol. 921 of Lecture Notes in Computer Science, pp. 209-219, 1995. [VM97] Vijay Varadharajan and Yi Mu, "Preserving privacy in mobile communications: a hybrid method", Personal Wireless Communications, 1997 IEEE International Conference on, 17-19 Dec. 1997 Pages: 532 – 536. [Var2002] Upkar Varshney, "Mobile Payments", Computer, 2002, vol.35, pp.120-121. [Wil95] Joseph E. Wilkes, "Privacy and Authentication Needs of PCS", IEEE Personal Communications, Vol. 2, No. 4, August 1995, pp. 11-15. [ZC2003] Xiao-Lin Zheng and Deren Chen, "Study of Mobile Payments System", IEEE International Conference on E-Commerce, 2003, pp.24-27.
|