<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442009000200010</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An Extended Payment Model for M-Commerce with Fair Non-Repudiation Protocols]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[DANG]]></surname>
<given-names><![CDATA[Tran Khanh]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[PHAN]]></surname>
<given-names><![CDATA[Thi Thanh Huyen]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Ho Chi Minh City University of Technology Faculty of Computer Science & Engineering ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Vietnam</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Ho Chi Minh City University of Technology Faculty of Computer Science & Engineering ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Vietnam</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2009</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2009</year>
</pub-date>
<numero>40</numero>
<fpage>63</fpage>
<lpage>70</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442009000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442009000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442009000200010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Non-repudiation in e-commerce has recently gained a lot of interest but its successor brother, non-repudiation in m-commerce, is still at the start. In this paper, we propose an extension of existing mobile payment models to introduce an extended mobile payment service (EMPS) model, which is based on assumptions about the cooperation between mobile network operators and financial institutions to deal with different payment amounts ranging from micro to macro payment. The novel model focuses on enhancement of non-repudiation problem. Fair non-repudiation protocols are developed for not only payment phase but also other phases in a typical m-commerce transaction, including price negotiation and content delivery. Joint signatures method is used in protocols to overcome the limitations in mobile handheld device capability and to reduce the trust dependence totally on the payment service. As with the proposed non-repudiation protocols, EMPS plays the role of a semi-trusted third party and is an indispensable factor for creating the fairness property. Non-repudiation analyses of these protocols are also conducted besides some guidelines for ensuring non-repudiation in m-commerce.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Communication system security]]></kwd>
<kwd lng="en"><![CDATA[M-commerce security]]></kwd>
<kwd lng="en"><![CDATA[non-repudiation]]></kwd>
<kwd lng="en"><![CDATA[semi-trusted 3rd party]]></kwd>
<kwd lng="en"><![CDATA[payment model]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Regular papers</font></p>     <p align="justify"><font face="verdana" size="4">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>An Extended Payment Model for M&#150;Commerce with Fair Non&#150;Repudiation Protocols</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Tran Khanh DANG<sup>1</sup> and Thi Thanh Huyen PHAN<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Faculty of Computer Science &amp; Engineering, HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (phone:+84&#150;8&#150;38647256, ext. 5841, e&#150;mail: </i><a href="mailto:khanh@cse.hcmut.edu.vn">khanh@cse.hcmut.edu.vn</a><i>).</i></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Faculty of Computer Science &amp; Engineering, HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (phone:+84&#150;8&#150;38647256, ext. 5842, e&#150;mail: </i><a href="mailto:huyenttp@cse.hcmut.edu.vn">huyenttp@cse.hcmut.edu.vn</a><i>).</i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Manuscript received June 29, 2009.     ]]></body>
<body><![CDATA[<br> Manuscript accepted for publication November 17, 2009.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">Non&#150;repudiation in e&#150;commerce has recently gained a lot of interest but its successor brother, non&#150;repudiation in m&#150;commerce, is still at the start. In this paper, we propose an extension of existing mobile payment models to introduce an extended mobile payment service (EMPS) model, which is based on assumptions about the cooperation between mobile network operators and financial institutions to deal with different payment amounts ranging from micro to macro payment. The novel model focuses on enhancement of non&#150;repudiation problem. Fair non&#150;repudiation protocols are developed for not only payment phase but also other phases in a typical m&#150;commerce transaction, including price negotiation and content delivery. Joint signatures method is used in protocols to overcome the limitations in mobile handheld device capability and to reduce the trust dependence totally on the payment service. As with the proposed non&#150;repudiation protocols, EMPS plays the role of a semi&#150;trusted third party and is an indispensable factor for creating the fairness property. Non&#150;repudiation analyses of these protocols are also conducted besides some guidelines for ensuring non&#150;repudiation in m&#150;commerce.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Key words: </b> Communication system security, M&#150;commerce security, non&#150;repudiation, semi&#150;trusted 3<sup>rd</sup> party, payment model.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/poli/n40/n40a10.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>REFERENCES</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; L. He and N. Zhang, "A New Signature Scheme: Joint Signature," in <i>ACM Symposium on Applied Computing, </i>2004, pp. 807 &#150; 812.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042344&pid=S1870-9044200900020001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; J. Liu, J. Liao, and X. Zhu, "A System Model and Protocol for Mobile Payment," in <i>Proc. of IEEE International Conference on e&#150;Business Engineering, </i>2005, pp. 638 &#150; 641.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042346&pid=S1870-9044200900020001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; R. K. Tiwari, "Fair Non Repudiation in Mobile Communication using Joint Signatures," in <i>Proc. of IEEE International Conference on Personal Wireless Communication, </i>2005, pp. 438 &#150; 440.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042348&pid=S1870-9044200900020001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; L. He and N. Zhang, "An asymmetric authentication protocol for M&#150;Commerce applications," in <i>Proc. of IEEE International Symposium on Computers and Communication, </i>Vol. 1, 2003, pp. 244 &#150; 250.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042350&pid=S1870-9044200900020001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; C. Chen, H. Lin, Y. Chen, and J. Jan, "A Fair Transaction Model in Mobile Commerce," in <i>Proc. of IEEE International Symposium on Signal Processing and Information Technology, </i>2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042352&pid=S1870-9044200900020001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; S. Kremer, O. Markowitch, and J. Zhou, "An Intensive Survey of Non&#150;repudiation Protocols," <i>Computer Communications, </i>pp. 1606 &#150; 1621, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042354&pid=S1870-9044200900020001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Jianying Zhou, "Non&#150;repudiation in Electronic Commerce," Artech House Computer Security Series, 2001.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042356&pid=S1870-9044200900020001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; S. Kungpisdan, B. Srinivasan, and P. D. Le, "A Secure Account&#150;Based Mobile Payment Protocol," in <i>Proc. of International Conference on </i><i>Information Technology: Coding and Computing, </i>2004, pp. 35 &#150; 39.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042358&pid=S1870-9044200900020001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; A. Vilmos and S. Karnouskos, "SEMOPS: Design of a New Payment Service," in <i>Proc. of International Workshop on Database and Expert </i><i>Systems Applications, </i>2003, pp. 865 &#150; 869.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042360&pid=S1870-9044200900020001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; S. Nambiar and C.T. Lu, "M&#150;Payment Solutions and M&#150;Commerce Fraud Management," as Chapter IX of Book: Advances in Security and Payment Methods for Mobile Commerce, pp. 192 &#150; 213, Idea Group Inc., 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042362&pid=S1870-9044200900020001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; C. Lee, W. Hu, and J. Yeh, "A System Model for Mobile Commerce", in <i>Proc. of International Conference on Distributed Computing Systems </i><i>Workshops, </i>2003, pp. 634 &#150; 639.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042364&pid=S1870-9044200900020001000011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; ISO/IEC 10181&#150;4. Information Technology &#150; Open Systems Interconnection &#150; Security Frameworks in Open System &#150; Part 4: Non&#150;repudiation Framework, ISO/IEC, 1996.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042366&pid=S1870-9044200900020001000012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; S. Nambiar, C.T. Lu, and L.R. Liang, "Analysis of Payment Transaction Security in Mobile Commerce," in <i>Proc. of IEEE International Conference on Information Reuse and Integration, </i>2004, pp. 475 &#150; 480.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6042368&pid=S1870-9044200900020001000013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>NOTE</b></font></p>     <p align="justify"><font face="verdana" size="2">This work was supported in part by Advances in Security &amp; Information Systems (ASIS) Lab, Faculty of Computer Science &amp; Engineering, HCMUT, Vietnam.</font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A New Signature Scheme: Joint Signature]]></article-title>
<source><![CDATA[ACM Symposium on Applied Computing]]></source>
<year>2004</year>
<page-range>807 - 812</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A System Model and Protocol for Mobile Payment]]></article-title>
<source><![CDATA[Proc. of IEEE International Conference on e-Business Engineering]]></source>
<year>2005</year>
<page-range>638 - 641</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tiwari]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fair Non Repudiation in Mobile Communication using Joint Signatures]]></article-title>
<source><![CDATA[Proc. of IEEE International Conference on Personal Wireless Communication]]></source>
<year>2005</year>
<page-range>438 - 440</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An asymmetric authentication protocol for M-Commerce applications]]></article-title>
<source><![CDATA[Proc. of IEEE International Symposium on Computers and Communication]]></source>
<year>2003</year>
<volume>1</volume>
<page-range>244 - 250</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Jan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Fair Transaction Model in Mobile Commerce]]></article-title>
<source><![CDATA[Proc. of IEEE International Symposium on Signal Processing and Information Technology]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kremer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Markowitch]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Intensive Survey of Non-repudiation Protocols]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2002</year>
<page-range>1606 - 1621</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[Jianying]]></given-names>
</name>
</person-group>
<source><![CDATA[Non-repudiation in Electronic Commerce]]></source>
<year>2001</year>
<publisher-name><![CDATA[Artech House Computer Security Series]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kungpisdan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Srinivasan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[P. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Secure Account-Based Mobile Payment Protocol]]></article-title>
<source><![CDATA[Proc. of International Conference on Information Technology: Coding and Computing]]></source>
<year>2004</year>
<page-range>35 - 39</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vilmos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Karnouskos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[SEMOPS: Design of a New Payment Service]]></article-title>
<source><![CDATA[Proc. of International Workshop on Database and Expert Systems Applications]]></source>
<year>2003</year>
<page-range>865 - 869</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nambiar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[C.T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[M-Payment Solutions and M-Commerce Fraud Management]]></article-title>
<source><![CDATA[Chapter IX of Book: Advances in Security and Payment Methods for Mobile Commerce]]></source>
<year>2005</year>
<page-range>192 - 213</page-range><publisher-name><![CDATA[Idea Group Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Yeh]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A System Model for Mobile Commerce]]></article-title>
<source><![CDATA[Proc. of International Conference on Distributed Computing Systems Workshops]]></source>
<year>2003</year>
<page-range>634 - 639</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<collab>ISO/IEC</collab>
<source><![CDATA[10181-4. Information Technology - Open Systems Interconnection - Security Frameworks in Open System - Part 4: Non-repudiation Framework]]></source>
<year>1996</year>
<publisher-name><![CDATA[ISO/IEC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nambiar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[C.T.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[L.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Analysis of Payment Transaction Security in Mobile Commerce]]></article-title>
<source><![CDATA[Proc. of IEEE International Conference on Information Reuse and Integration]]></source>
<year>2004</year>
<page-range>475 - 480</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
