Peirce M, OMahony D. Flexible real-time payment methods for mobile communications[J]. IEEE Personal Communications Magazine, 1999, 6(6): 44 - 55.[2]Horn O G, Preneel B. Authentication and payment in future mobile systems[C][J].In: Computer Security-ESORICS98 Proceedings, Lecture Notes in Computer Science, Louvain-la-Neuve, Belgium,Springer Verlag, September.1998, 1485:277-[3]Martin K M, Preneel B, Mitchell C J, et al.. Secure Billing for Mobile Information Services in UMTS [M]. Antwerp, Belgium:Springer, May 1998:535 - 548.[4]李明柱,李志江,杨义先.移动通信增值服务认证和支付研究.通信学报[J]2003,24(4):123-127.[5]姬东耀,王育民.移动计算环境中的认证与小额支付协议.电子学报[J],2002,30(4):495-498.[6]Yen S, Ho L, Huang C. Internet micropayment based on unbalanced one-way binary tree. Proc. CrypTEC99, Hong Kong,July 1999: 155- 162.[7]Tewari H, OMahony D. Real-time payments for mobile IP. IEEE Communications Magazine, 2003, 41(2): 126 - 136.[8]Molva R, Samfat D, Tsudik G. Authentication of mobile users. IEEE Networks, Special Issue in Mobile Communications, 1994,8 (2): 26 - 35.[9]Buttyan L. Removing the financial incentive to cheat in micropayment schemes [J].IEEE Electronics Letters.2000, 36(2):132-[10]Jakobsson M. Ripping coins for a fair exchange [A]. Advances in Cryptology EuroCrypt95, LNCS921 [C], St. Malo, France, May 1995:220 - 230.
|