|
[1]S. Brands, “Untraceable Off-Line Cash in Wallet with Observers,” Conference on Advances in Cryptology- CRYPTO '93, vol. 773 , pp.302 – 318, 1994.
[2]D. Chaum and E. van Heyst, “Group Signatures,” Advances in Cryptology EUROCRYPT ’91, Lecture Notes in Computer Science, pp. 257 – 265, 1991.
[3]C. C. Chang, C. Y. Lee, and Y. C. Chiu, “Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks,” Computer Communications, vol. 32, no. 4, pp. 611 – 618, Mar. 2009.
[4]Z. Eslami and M. Talebi, “A New Untraceable Off-line Electronic Cash System,” Electronic Commerce Research and Applications, vol. 10, no. 1, pp. 59 – 66, Jan.–Feb. 2011.
[5]D. He, J. Bu, S. Chan, C. Chen, and M. Yin, “Privacy-Preserving Universal Authentication Protocol for Wireless Communications,” IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 431 – 436, Feb. 2011.
[6]Z. Huang and K. F. Chen, “Electronic Payment in Mobile Environment,” in Proceedings of the 13th International Workshop on Database and Expert Systems Applications, France, pp. 413 – 417, 2002.
[7]K. F. Hwang and C.C. Chang, “A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services” IEEE Transactions on Wireless Communications, vol. 2, no. 2, pp. 400 – 407, Mar. 2003.
[8]D. He, S. Chan, C. Chen, J. Bu, and R. Fan, “Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks,” Wireless Personal Communications, vol. 61, no. 2, pp. 465 – 476, 2011.
[9]D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, “A Strong User Authentication Scheme with Smart Cards for Wireless Communications,” Computer Communications, vol. 34, no. 3, pp. 367 – 374, Mar. 2011.
[10]R. J. Hwang, S. H. Shiau, and D. F. Jan, “A New Mobile Payment Scheme for Roaming Services,” Electronic Commerce Research and Applications, vol. 6, no. 2, pp. 184 – 191, 2007.
[11]J. T. Isaac, J. S. Camara, S. Zeadally, and J. T. Marquez, “A Secure Vehicle-to-Roadside Communication Payment Protocol in Vehicular Ad Hoc Networks,” Computer Communications, vol. 31, no. 10, pp. 2478 – 2484, Jun. 2008.
[12]Y. Jiang and C. Lin, “Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks,” IEEE Transaction on Wireless Communications, vol. 5, no. 9, pp. 2569 – 2577, Sept. 2006.
[13]L. Lamport, “Password Authentication with Insecure Communication,” Communications of The ACM, vol. 24, no. 11, pp. 770 – 772, Nov. 1981.
[14]P. Lin, H. Y. Chen, Y. Fang, J. Y. Jeng, and F. S. Lu, “A Secure Mobile Electronic Payment Architecture Platform for Wireless Mobile Networks,” IEEE Transaction on Wireless Communications, vol. 7, no. 7, pp. 2705 – 2713, Jul. 2008.
[15]T. F. Lee, S. H. Chang, T. Hwang, and S. K. Chong, “Enhanced Delegation-Based Authentication Protocol for PCSs,” IEEE Transactions on Wireless Communications, vol. 8, no. 5, pp. 2166 – 2171, May 2009.
[16]W. B. Lee and C. K. Yeh, “A New Delegation-Based Authentication Protocol for Use in Portable Communication Systems,” IEEE Transactions on Wireless Communications, vol. 4, no. 1, pp. 57 – 64, Jan. 2005.
[17]H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, “Enhanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks,” Mathematical and Computer Modelling, vol. 55, no. 1 – 2, pp. 214 – 222, Jan. 2012.
[18]T. Nakanishi and N. Funabiki, “Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear maps,” in Proceediings ASIACRYPT’05, Lecture Notes In Computer Science, vol. 3788, pp. 533 – 548, 2005.
[19]R. L. Rivest and A. Shamir, “Payword and Micromint: Two Simple Micropayment Schemes,” in Proceedings International Workshop on Security Protocols, Lecture Notes In Computer Science, vol. 1189, pp. 69 – 87, 1997.
[20]S. Yen, L. Ho, and C. Huang, “Internet Micropayment Based on Unbalanced One-Way Binary Tree,” in Proceedings of International Workshop on Cryptographic Techniques and E-Commerce,CrypTEC’99, Hong Kong, pp. 155 – 162, Jul. 1999.
[21]G. Yang, Q. Huang, D. S. Wong, and X. Deng, “Universal Authentication Protocols for Anonymous Wireless Communications,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 168 – 174, Jan. 2010.
[22]T. Y. Youn and J. Lim, “Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability,” IEEE Communications Letters, vol. 14, no. 9, pp. 791 – 793, Sept. 2010.
[23]G. Yang, D. S. Wong, and X. Deng, “Anonymous and Authenticated Key Exchange for Roaming Networks,” IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3461 – 3472, 2007.
|