2005
DOI: 10.1016/j.comnet.2004.10.011
|View full text |Cite
|
Sign up to set email alerts
|

A fair and secure mobile billing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…They found that mechanisms of IT security protection are lacked and also there are familiarities of staffs with standards of IT security such as ISO/IEC 27001. In addition, in other studies of technological innovation in the healthcare, security concern has been one of the critical factors that inhibit the process of adoption decision in the healthcare context [22], [109], [120][121][122]. Thus, in our research, this component is taken to be assessed.…”
Section: His Security Concernmentioning
confidence: 99%
“…They found that mechanisms of IT security protection are lacked and also there are familiarities of staffs with standards of IT security such as ISO/IEC 27001. In addition, in other studies of technological innovation in the healthcare, security concern has been one of the critical factors that inhibit the process of adoption decision in the healthcare context [22], [109], [120][121][122]. Thus, in our research, this component is taken to be assessed.…”
Section: His Security Concernmentioning
confidence: 99%
“…On the basis of our past researches in mobile commerce [5][6][7], a trusted role which called "observer" is involved to achieve the non-repudiated requirement in mobile transaction. It is selected freely by the subscriber.…”
Section: Definition 3 Communication Modelmentioning
confidence: 99%
“…This method can provide real-time communication with service providers, however, it is a computationally expensive approach for mobile mesh nodes. The second example is a one-way hash chain mechanism which provides the basis for correct billing [15]. So far, most of billing and payment protocols were developed under the home-foreign domain roaming environment.…”
Section: 무선망 보안 접속을 위한 효율적인 인증 기법 21mentioning
confidence: 99%