Authentication protocols with nonrepudiation services in personal communication systems

被引:20
|
作者
Lin, HY [1 ]
Harn, L
机构
[1] Calif State Univ, Dept Comp Sci, San Marcos, CA 92096 USA
[2] Univ Missouri, Kansas City, MO 64111 USA
关键词
authentication; cryptography; nonrepudiation; PCS;
D O I
10.1109/4234.781006
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through the combination of the public-key digital signature and the hash-chaining techniques, a new set of authentication protocols is proposed with the capability of arbitrating disputed bills. These protocols provide security services required by regular authentication protocols and are efficient in consideration of the specific Personal Communication Systems (PCS) environment. They protect subscribers from incorrect service charges and provide service providers legal evidences to collect bills that are denied. They also help identify whether an accounting error, an internal fraud, or a security breach of the service provider causes the incorrect service charge.
引用
收藏
页码:236 / 238
页数:3
相关论文
共 50 条
  • [1] Nonrepudiation Protocols in Cloud Systems
    Ali, Muqeet
    Gouda, Mohamed
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT 2016), 2016,
  • [2] An enhanced authentication protocol for personal communication systems
    Stach, JS
    Park, EK
    Su, Z
    [J]. 1998 IEEE WORKSHOP ON APPLICATION-SPECIFIC SOFTWARE ENGINEERING AND TECHNOLOGY (ASSET 98) - PROCEEDINGS, 1998, : 128 - 132
  • [3] Verification of authentication protocols for mobile satellite communication systems
    Abouhogail, Reham Abdellatif
    [J]. EGYPTIAN JOURNAL OF REMOTE SENSING AND SPACE SCIENCES, 2014, 17 (02): : 171 - 177
  • [4] TECHNIQUES FOR PRIVACY AND AUTHENTICATION IN PERSONAL COMMUNICATION-SYSTEMS
    BROWN, D
    [J]. IEEE PERSONAL COMMUNICATIONS, 1995, 2 (04): : 6 - 10
  • [5] Designing authentication protocols for third generation mobile communication systems
    Cheng, SM
    Shieh, SP
    Yang, WH
    Lee, FY
    Luo, JN
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2005, 21 (02) : 361 - 378
  • [6] Analysis of a non repudiation authentication protocol for Personal Communication Systems
    Stach, JF
    Park, EK
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 289 - 293
  • [7] Two-phase Nonrepudiation Protocols
    Ali, Muqeet
    Reaz, Rezwana
    Gouda, Mohamed
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT 2016), 2016,
  • [8] Nonrepudiation Protocols Without a Trusted Party
    Ali, Muqeet
    Reaz, Rezwana
    Gouda, Mohamed G.
    [J]. Networked Systems, NETYS 2016, 2016, 9944 : 1 - 15
  • [9] AN AUTHENTICATION PROTOCOL WITH BILLING NON-REPUDIATION TO PERSONAL COMMUNICATION SYSTEMS
    Chen, Tzung-Her
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2657 - 2664
  • [10] PERSONAL COMMUNICATION SERVICES
    MATAPURKAR, KG
    [J]. ELECTRONICS INFORMATION & PLANNING, 1994, 21 (08): : 470 - 478