Horn et al., 1998 - Google Patents
Authentication and payment in future mobile systemsHorn et al., 1998
View PDF- Document ID
- 13667347456027695945
- Author
- Horn G
- Preneel B
- Publication year
- Publication venue
- European Symposium on Research in Computer Security
External Links
Snippet
This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication …
- 201000007023 thrombotic thrombocytopenic purpura 0 description 33
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Horn et al. | Authentication and payment in future mobile systems | |
RU2718229C1 (en) | Establishing secure channel | |
EP1573719B1 (en) | A method, system and computer program product for secure ticketing in a communications device | |
US9990796B2 (en) | Data card verification system | |
Horn et al. | Authentication protocols for mobile network environment value-added services | |
Li et al. | An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network | |
CA2196356C (en) | Transaction verification protocol for smart cards | |
EP0979496A2 (en) | Two way authentication protocol | |
EP4208982B1 (en) | Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge | |
Horn et al. | Authentication and payment in future mobile systems | |
Martin et al. | Secure billing for mobile information services in UMTS | |
US7451314B2 (en) | Cryptographic authentication process | |
Manz | Digital Signature | |
JP2005513564A (en) | Cryptography to distribute the load across multiple entities and their devices | |
AU2020101863A4 (en) | IoT-Based Micropayment Protocol for Wearable Devices with Unique Verification | |
Mohammed et al. | Elliptic curve cryptosystems on smart cards | |
Xia et al. | A third-party mobile payment scheme based on NTRU against quantum attacks | |
Hsu et al. | Efficient proxy signature schemes using self-certified public keys | |
Tsaur et al. | An efficient and secure ECC-based partially blind signature scheme with multiple banks issuing E-cash payment applications | |
He et al. | A new signature scheme: joint-signature | |
unther Horn et al. | Authentication and Payment in Future Mobile Systems | |
Satizábal et al. | Reducing the computational cost of certification path validation in mobile payment | |
Das et al. | SPAM: secure protocol for authentication in mobile-communications | |
Lee et al. | Temporary mobile user certificate for mobile information services in UMTS | |
Janbandhu | Novel biometric digital signature system for electronic commerce applications |