|
[1] H. Akashika, H. Moribatake, and Y. Nakayama,“Electronic money transfer schemes for non-real-time interaction,”Proc. SCIS’99, SCIS’99-W4-3.5, 1999. [2] N. Asokan, P. A. Janson, M. Steiner and M. Waidner,“The State of art in the electronic payment systems,” IEEE Computer,Vol. 30, No. 9, pp. 28-35, September 1997. [3] W. Diffie, M. Hellman,“Multiuser Cryptographic Techniques,” In Proceedings AFIPS 1976 National Computer Conference, pp. 109-112, June 1976. [4] B. Feng, L. Anantharaman, R. Deng,“Design of portable mobile devices based e-payment system and e-ticketing system with digital signature, ” Proceedings of International Conferences on. Info-tech and Info-net, ICII 2001-Beijing, Vol. 6, pp. 7 – 12, November 2001. [5] W.H. Lee, B.S. Jeng, S.S. Tseng and C.H. Wang,“Electronic Toll Collection Based on Vehicle-Positioning System Techniques,”2004. IEEE International Conference on Networking, Sensing & Control Taipei, Taiwan, March 2004. [6] T.C. Lu, C.T. Chen,“A mobile ticket validation by VSS tech with time-stamp, ”e-Technology, e-Commerce and e-Service, 2004.IEEE International Conference on, Vol. 28-31, pp. 267 – 270, March 2004. [7] S. Matsuo and W. Ogata,“Electronic Ticket Scheme for ITS,”IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp. 142-150, January 2003. [8] B. Patel and J. Crowcroft,“Ticket Based Service Access for theMobile User, ”The Proceedings of the third annual ACM/IEEE International Conference on Mobile Computing and Networking, Budapest, Hungary, September 1997. [9] F. Pedone,“Optimistic validation of electronic tickets, ”2001. Proceedings.20th IEEE Symposium on, Reliable Distributed Systems, pp. 110 – 119, October 2001. [10] T.S.K. Reddy, H. Mohanty, R.K. Ghosh, S. Madria,“Two Distributed Algorithms for E-ticket Validation protocols for Mobile Clients,”In Proceedings of 2003 IEEE Conference on Electronic Commerce (CEC''03), California, pp. 223-230, June 2003. [11] R. Rivest and A. Shamir,“PayWord and MicroMint:Two simple micropayment schemes,” Proceedings of the 4th Security Protocols International Workshop (Security Protocols), Berlin, Vol. 1189, pp. 69–87, 1996. [12] T. Sander and A. Ta-Shma,“Auditable, anonymous electronic cash,” Advances in Cryptography -CRYPTO’99, Lecture Notes in Computer Science, Vol. 1666, pp. 555–572, 1999. [13] D.N. Serpanos, R.J. Lipton,“Defense against man-in-the-middle attack in client-server systems, ” Proceedings of Sixth IEEE Symposium on Computers and Communications, 2001, pp. 9 – 14, July 2001. [14] W.Y. Shieh, W.H. Lee, S.L. Tung, and C.D. Ho,“A Novel Architecture for Multilane-Free-Flow Electronic-Toll-Collection Systems in the Millimeter-Wave Range,”IEEE Transactions on Intelligent Transportation Systems, Vol. 6, No. 3, pp. 294-301, September 2005. [15] Z. Zeli, M. Huadong,“Modeling and verification of a simple network payment protocol,” Proceedings of International Conference on Communication Technology, ICCT 2003, Vol. 2, pp. 1670 – 1673, April 2003.
|