期刊文献+

移动计算网络环境中的认证与小额支付协议 被引量:12

An Authentication and Micropayment Protocol for Mobile Computing Network
下载PDF
导出
摘要 本文在分析现有移动用户认证协议与因特网认证协议基础上 ,针对移动计算网络的技术特点设计了一个用于移动用户与收费信息服务网络相互认证和用户进行小额电子支付的协议 ,该协议的新颖之处在于把小额支付方案融入认证协议当中 ,使移动用户可以利用笔记本电脑或掌上电脑进行付费的网面浏览、购买低价位信息商品以及进行移动电子商务 ,同时也为移动用户漫游时的记费提供了依据 .协议不仅在公共参数的存储空间需求和用户端计算负荷上是适当的 ,而且可以保护用户不被错误收费 ,同时提供服务网络防止用户抵赖的合法证据 .该协议基于一个全局的公钥基础设施 ,适用于未来的基于第三代移动通信系统的网络计算环境 . According to the requirements of the technique in mobile computing network,an efficient protocol for mutual authentication and electronic payment for mobile computing network is proposed.The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocol.The protocols provide security services required by regular authentication and payment protocols and are efficient in consideration of the storage requirement and computation overheads on subscribers.They protect subscribers from incorrect service charges and provide service providers legal evidences to collect bills that are denied.By using public key infrastructure,they can be used as authentication and payment protocol in future mobile systems.
出处 《电子学报》 EI CAS CSCD 北大核心 2002年第4期495-498,共4页 Acta Electronica Sinica
基金 国家自然科学基金 (No 1 9931 0 1 0 ) 高等学校博士点基金 (No 2 0 0 0 0 70 1 0 1 )
关键词 小额支付协议 公钥基础设施 移动计算网络 认证 计算机网络 mobile computing network authentication micropayment public key infrastructure
  • 相关文献

参考文献9

  • 1[1]Z J Hass,R Alonso,D Duchamp,B Gopinath.Special issue on mobile and wireless comp uting networks [J].IEEE Journal on Selected Areas in Communications,1995,13(5) :839-923.
  • 2[2]R Molva,D Samfat,G Tsudic.Authentication of mobile users [J].IEEE Network,1994 ,8(2):26-34.
  • 3[3]S Mohan,Privacy and authentication protocols for PCS [J].IEEE personal communi cations magazine,1996,3(5):34-38.
  • 4[4]L Harn,H Lin.Modifications to enhance the security of GSM [A].Proc 5th Nat Con f on Information Security[C].Taiwan,1995.97-100.
  • 5[5]Y Frankel,A Herzberg.Security issues in a CDPD wireless network [J].IEEE Perso nal communications magazine,1995,2(4):16-27.
  • 6[6]ETSI SMG/SG/TD-73.Protocols for UMTS Providing Mutual Authentication and Key Es tablishment Using Asymmetric Techniques[S].
  • 7[7]M Bellare,S K Miner.A forward -secure digital signature scheme[A].Proc.Cryto ′99[C].Berlin:Springer.1999.431-448.
  • 8[8]S M Bellovin,M Merrit,Limitation of the kerberos authentication system [J].Com puter Communication Review,1990,20(5):119-132.
  • 9[9]R L Revest,A Shamir.Payword and micromint:two simple micropayment schemes [A]. Proc.Security Protocol[C].Berlin:Springer,1997.69-87.

同被引文献95

引证文献12

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部