참고문헌
- T. Weitzel, W. Konig, "Vom E-zum M-Payment" (in German), http://much-magic.wiwi.unifrankfurt.de/profs/mobile/infos.html
- Jean-Michel sahut and Malgorzata Galuszewska, "Electronic payment market:A non-optimal equilibrium," Proceedings of the 2004 International Symposium on Applications and the Internet Workshops(SAINTW'04), pp.3-8, 2004.
- Antovski, L. and Gusev, M., "M-payments," Proceedings of the 25th International Conference information Technology Interfaces(ITI'03), pp.95-100, 2003.
- Agnieszka Zmijewska, "Evaluating wireless technologies in mobile payments-A customer centric approach," Proceedings of the International Conference on Mobile Business(ICMB'05), pp.354-362, 2005
- Ondrus, J. and Pigneur, Y., "A distruption analysis in the mobile payment market," Proceedings of the 38th Hawaii International Conference on System Sciences(HICSS-38'05):84c-84c, 2005.
- Ashutosh Saxena, Manik Lal Das and Anurag Gupta, MMPS: "A versatile mobile-to-mobile payment system," Proceedings of the International Conference on Mobile Business(ICMB'05), pp.400- 405, 2005.
- Delic, N. and Vukasinovic, Ana., "Mobile payment solution-symbiosis between banks, application service providers and mobile network operators," Proceedings of the Third International Conference on Information Technology: New Generations (ITNG'06), pp.346-350, 2006.
- Ondrus, J., Camponovo, G., Pigneur, Y., "A proposal for a multi-perspective analysis of the mobile payment environment," Proceedings of the International Conference on Mobile Business(ICMB'05), pp.659- 662, 2005.
- Nambiar, S. and CHANG T. L., "M-payment solutions and m-commerce fraud management," Available at: http://europa.nvc.cs.vt.edu/~ctlu/Publication/ M-Payment-Solutions.pdf, September 9, 2004.
- Li Xi, Hu Han-ping, "A secure mobile payment system," Computer Technology and Application, ISSN1934-7332, vol.1, no.1, June 2007.
- S. Bellovin and M. Merritt, "Encrypted Key Exchanged: Password-Based Protocols Secure Against Dictionary Attacks," In Proc. of IEEE Symposium on Research in Security and Privacy, pp.72-84, 1992.
- W. Stallings, Cryptography and Network Security, 4th Edition, Prentice Hall International, 2007.
- C. Yang, T. Chang and M. Hwang, "Cryptanalysis of Simple Authenticated Key Agreement Protocols," IEICE Trans. Fundamentals, vol.E87-A, no.8, pp. 2174-2176, 2004.
- P. Syverson, "A Taxonomy of Relay Attacks," In Proc. of Computer Security Foundations Workshop VII, pp.187-191, 1994.
- S. McCanne and S. Floyd, "NS network simulator," URL: http://www.isi.edu/nsnam/ns