1 |
http://www.gartner.com/it/page.jsp?id=208315, "Worldwide Mobile Payment Transaction calue to Surpass $171.5 Billion"
|
2 |
A. Shamir. "Identity-based crypto systems and signature schemes." In Advances in Cryptology, volume196 of LNCS, pages 47-53. Springer-Verlag, 1985
|
3 |
S. Fourati, "Protocol specification core functions ofVisa International 3-D security protocol, " Wireless Communications, Issue 7, pp.353-360, 2002.
|
4 |
Sang-Kyu Byun "Analysis for the Smart Phone Ecosystem and its Economic Spillover Effects" Journal of Digital Contents Society Vol.12, pp.205-216, 2011.
과학기술학회마을
DOI
ScienceOn
|
5 |
W. Xie and Z. Zhang. "Certificateless Signcryption without Pairing." Cryptology ePrint Archive : Report2010/187, Available from : http://eprint.iacr.org/2010/187
|
6 |
Kenneth G. Paterson "A comparison between traditional public key infrastructures and Identity-based Cryptography" Information Security Technical Report Volume 8, Issue 3, pp. 57-72, July 2003,
DOI
ScienceOn
|
7 |
M. Barbosa and P.Farshim "Certificateless signcryption" Cryptology eprint archive : report 2008/143. Available from : http://eprint.iacr.org/2008/143.
|
8 |
C. Wu and Z. Chen. "A new efficient certificateless signcryption scheme." In International Symposium on Information Science and Engineering, ISISE'8., volume 1, pages 661-64, 2008.
|
9 |
S.S.D. Selvi, S.S. Vivek, and C.P. Ragan. "On thesecurity of certificateless signcryption schemes." Cryptology ePrint Archive : Report 2009/298, Available from : http://eprint.iacr.org/2009/298.
|
10 |
W. Xie and Z. Zhang. "Efficient and provably-securecertificateless signcryption from bilinear maps." Cryptology ePrint Archive : Report 2009/578, Available from : http://eprint.iacr.org/2009/578.
|
11 |
Eun wha Jhee, Ae young Kim, Sang ho Lee "Improving the Security of Mobile Credit Card Payment Protocol for USIM-based Smart Phone" Journal of Computing Science and Engineering, 17(4), April 2011.
과학기술학회마을
|
12 |
S. Kungpisdan, B. Srinivasan and P. Le, "A secure account-based mobile payment protocol, " Proc. of ITCC 2004, vol.1, pp.35-39, 2004.
|
13 |
X. Wu, O. Dandash and P. Le, "The design and implementation of a smartphone payment system based on limited-used key generation scheme, "Third International Conference on Information Technology : New Generations, pp.458-463, 2006.
|
14 |
X. Wang and N. Cui, "Research of security mobilepayment protocol in communication restrictions scenarios, " Computational Intelligence and Security, pp.213-217, 2009.
|