{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:11:44Z","timestamp":1649099504431},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T00:00:00Z","timestamp":1254268800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11277-009-9818-9","type":"journal-article","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T09:54:44Z","timestamp":1254218084000},"page":"551-566","source":"Crossref","is-referenced-by-count":2,"title":["A Provable Billing Protocol on the Current UMTS"],"prefix":"10.1007","volume":"55","author":[{"given":"Hsia-Hung","family":"Ou","sequence":"first","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Jinn-Ke","family":"Jan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,30]]},"reference":[{"key":"9818_CR1","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, charging and billing. Technical Report, 3GPP TS 22.115."},{"key":"9818_CR2","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, charging management, charging architecture and principles. Technical Report, 3GPP TS 32.240."},{"key":"9818_CR3","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, charging management, charging principles. Technical Report, 3GPP TS 32.200."},{"key":"9818_CR4","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, security architecture. Technical Report, 3GPP TS 33.102."},{"key":"9818_CR5","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, specification of the MILENAGE algorithm set, document 1: General. Technical Report, 3GPP TS 35.205."},{"key":"9818_CR6","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, specification of the MILENAGE algorithm set, document 5: Summary and results of design and evaluation, Technical Report, 3GPP TS 35.909."},{"key":"9818_CR7","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, telecommunication management, charging management, 3G call and event data for the circuit switched (CS) domain. Technical Report, 3GPP TS 32.005."},{"key":"9818_CR8","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, telecommunication management, charging management, call and event data for the packet switched (PS) domain. Technical Report, 3GPP TS 32.015."},{"key":"9818_CR9","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, telecommunication management, charging management, charging data description for the circuit switched (CS) domain. Technical Report, 3GPP TS 32.205."},{"key":"9818_CR10","unstructured":"3rd Generation Partnership Project. Technical specification group services and systems aspects, telecommunication management, charging management, charging data record (CDR) transfer. Technical Report, 3GPP TS 32.295."},{"key":"9818_CR11","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1016\/S0140-3664(00)00347-9","volume":"23","author":"B. Askwith","year":"2000","unstructured":"Askwith B., Merabti M., Shi Q. (2000) MNPA: A mobile network privacy architecture. Computer Communications 23: 1777\u20131788","journal-title":"Computer Communications"},{"key":"9818_CR12","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/90.365435","volume":"3","author":"R. Bird","year":"1995","unstructured":"Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R., Yung M. (1995) The kryptoknight family of light-weight protocols for authentication and key distribution. IEEE\/ACM Transactions on Networking 3: 31\u201341","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9818_CR13","doi-asserted-by":"crossref","unstructured":"Chen, H.-B., & Hsueh, S.-C. (2003). Light-weight authentication and billing in mobile communications. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (Annual 2003), 245\u2013252.","DOI":"10.1109\/CCST.2003.1297567"},{"key":"9818_CR14","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.comnet.2004.10.011","volume":"48","author":"Y.-Y. Chen","year":"2005","unstructured":"Chen Y.-Y., Jan J.-K., Chen C.-L. (2005) A fair and secure mobile billing system. Computer Networks 48: 517\u2013524","journal-title":"Computer Networks"},{"key":"9818_CR15","first-page":"99","volume":"5","author":"C. K. Dimitriadis","year":"2007","unstructured":"Dimitriadis C. K., Shaikh S. A. (2007) A biometric authentication protocol for 3G mobile systems: Modelled and validated using CSP and rank functions. International Journal of Network Security 5: 99\u2013111","journal-title":"International Journal of Network Security"},{"key":"9818_CR16","unstructured":"European Telecommunication Standards Institute (ETSI). (1993). Recommendation GSM 03.20, security related network functions. Technical Report."},{"key":"9818_CR17","doi-asserted-by":"crossref","unstructured":"Eyermann, F., Racz, P., Stiller, B., Schaefer, C., & Walter T., (2005). Service-oriented accounting configuration management based on diameter. First IEEE International Workshop on performance and Management of Wireless and Mobile Networks (IEEEperf 2005), Sydney, Australia, November 15.","DOI":"10.1109\/LCN.2005.124"},{"key":"9818_CR18","first-page":"81","volume":"7","author":"M. G. Gouda","year":"2008","unstructured":"Gouda M. G., Liu A. X. (2008) Formal specification and verification of a secure micropayment protocol. International Journal of Network Security 7: 81\u201387","journal-title":"International Journal of Network Security"},{"key":"9818_CR19","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/25.994813","volume":"51","author":"G. Horn","year":"2002","unstructured":"Horn G., Martin K. M., Mitchell C. J. (2002) Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology 51: 383\u2013392","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"9818_CR20","first-page":"81","volume":"2","author":"M.S. Hwang","year":"2006","unstructured":"Hwang M.S., Sung P.C. (2006) A study of micro-payment based on one-way hash chain. International Journal of Network Security 2: 81\u201390","journal-title":"International Journal of Network Security"},{"key":"9818_CR21","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MWC.2002.986464","volume":"9","author":"L. Jin","year":"2002","unstructured":"Jin L., Ren S., Feng L., Hua G. Z. (2002) Research on WAP clients supports SET payment protocol. IEEE Wireless Communications 9: 90\u201395","journal-title":"IEEE Wireless Communications"},{"key":"9818_CR22","doi-asserted-by":"crossref","unstructured":"Karygiannis, A., Kiayias, A., & Tsiounis, Y. (2005). A solution for wireless privacy and payments based on e-cash. First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), 206\u2013218.","DOI":"10.1109\/SECURECOMM.2005.9"},{"key":"9818_CR23","first-page":"235","volume":"4","author":"M. Kim","year":"2007","unstructured":"Kim M., Koc C. K. (2007) Vulnerabilities in the adachi-aoki-komano-ohta micropayment scheme. International Journal of Network Security 4: 235\u2013239","journal-title":"International Journal of Network Security"},{"key":"9818_CR24","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1109\/VETECS.2004.1390676","volume":"4","author":"M. Koutsopoulou","year":"2004","unstructured":"Koutsopoulou M., Kaloxylos A. (2004) A holistic solution for charging, billing and accounting in 4g mobile systems. 2004 IEEE 59th Vehicular Technology Conference (VTC 2004-Spring) 4: 2257\u20132260","journal-title":"2004 IEEE 59th Vehicular Technology Conference (VTC 2004-Spring)"},{"key":"9818_CR25","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.comcom.2005.11.022","volume":"30","author":"M. Koutsopoulou","year":"2007","unstructured":"Koutsopoulou M., Kaloxylos A., Alonistioti A., Merakos L. (2007) A platform for charging, billing, and accounting in future mobile networks. Computer Communications 30: 516\u2013526","journal-title":"Computer Communications"},{"key":"9818_CR26","doi-asserted-by":"crossref","unstructured":"Li, S., Wang, G., Zhou, J., & Chen, K. (2007). Undeniable mobile billing schemes. In: 4th European PKI workshop: Theory and practice (EuroPKI\u201907) (vol. 4582, pp. 338\u201334). Mallorca, Balearic Islands: LNCS, Springer.","DOI":"10.1007\/978-3-540-73408-6_25"},{"key":"9818_CR27","first-page":"259","volume":"3","author":"K. Mangipudi","year":"2006","unstructured":"Mangipudi K., Katti R., Fu H. (2006) Authentication and key agreement protocols preserving anonymity. International Journal of Network Security 3: 259\u2013270","journal-title":"International Journal of Network Security"},{"key":"9818_CR28","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1016\/j.comnet.2006.06.014","volume":"51","author":"S. Mohanty","year":"2007","unstructured":"Mohanty S., Xie J. (2007) Performance analysis of a novel architecture to integrate heterogeneous wireless systems. Computer Networks 51: 1095\u20131105","journal-title":"Computer Networks"},{"key":"9818_CR29","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1109\/49.464720","volume":"13","author":"B. C. Neuman","year":"1995","unstructured":"Neuman B. C. (1995) Security, payment, and privacy for network commerce. IEEE Journal on Selected Areas in Communications 13: 1523\u20131531","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9818_CR30","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/j.amc.2007.03.034","volume":"192","author":"H.-H. Ou","year":"2007","unstructured":"Ou H.-H., Hwang M.-S., Jan J.-K. (2007) A simple mobile communication billing system among charged parties. Applied Mathematics and Computation 192: 487\u2013495","journal-title":"Applied Mathematics and Computation"},{"key":"9818_CR31","first-page":"107","volume":"4","author":"D. Palaka","year":"2007","unstructured":"Palaka D., Daras P., Petridis K., Strintzis M. G. (2007) A novel peer-to-peer payment protocol. International Journal of Network Security 4: 107\u2013120","journal-title":"International Journal of Network Security"},{"issue":"2","key":"9818_CR32","first-page":"1603","volume":"2","author":"M. Pias","year":"2002","unstructured":"Pias M., Wilbur S., Bhatti S., Crowcroft J. (2002) Securing the internet metering and billing. IEEE Global Telecommunications Conference (GLOBECOM) 2(2): 1603\u20131607","journal-title":"IEEE Global Telecommunications Conference (GLOBECOM)"},{"key":"9818_CR33","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/S0140-3664(99)00010-9","volume":"22","author":"J. F. Stach","year":"1999","unstructured":"Stach J. F., Park E. K., Makki K. (1999) Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications 22: 615\u2013680","journal-title":"Computer Communications"},{"key":"9818_CR34","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2003.1179561","volume":"41","author":"H. Tewari","year":"2003","unstructured":"Tewari H., O\u2019Mahony D. (2003) Real-time payments for mobile IP. IEEE Communications Magazine 41: 126\u2013136","journal-title":"IEEE Communications Magazine"},{"key":"9818_CR35","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/TSMCA.2003.819917","volume":"33","author":"H. Wang","year":"2003","unstructured":"Wang H., Zhang Y., Cao J., Varadharajan V. (2003) Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man and Cybernetics, Part A 33: 697\u2013708","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"9818_CR36","first-page":"342","volume":"7","author":"S. Wang","year":"2008","unstructured":"Wang S., Cao Z., Bao H. (2008) Efficient certificateless authentication and key agreement (CL-AK) for grid computing. International Journal of Network Security 7: 342\u2013347","journal-title":"International Journal of Network Security"},{"key":"9818_CR37","first-page":"1","volume":"2","author":"C.-C. Yang","year":"2006","unstructured":"Yang C.-C., Chu K.-H., Yang Y.-W. (2006) 3G and WLAN interworking security: Current status and key issues. International Journal of Network Security 2: 1\u201313","journal-title":"International Journal of Network Security"},{"key":"9818_CR38","unstructured":"Yen, S., Ho, L., & Huang, C. (1999). Internet micropayment bared on unbalanced one-way binary tree. Proceedings on CrypTEC \u201999 155\u2013162."},{"key":"9818_CR39","unstructured":"Yu, S., Yoon, S., Lee, J., Kim, H., & Song, J. (2006). Service-oriented issues: Mobility, security, charging and billing management in mobile next generation networks. The 1st International Workshop on Broadband Convergence Networks (BcN 2006), 1\u201310."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9818-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-009-9818-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9818-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:05:20Z","timestamp":1559394320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-009-9818-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,30]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["9818"],"URL":"https:\/\/doi.org\/10.1007\/s11277-009-9818-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,30]]}}}