参考文献
|
-
Asokan, N.,Janson, P.A.,Steiner, M.,Waidner, M.(1997).The State of the Art in Electronic Payment Systems.IEEE Computer,30(9),28-35.
-
Barnes, S.J.(2002).The Mobile Commerce Value Chain: Analysis and Future Developments.International Journal of Information Management,22(2),91-108.
-
Bird, R.,Gopal, I.,Herzberg, A.,Janson, P.,Kutten, S.,Molva, R.,Yung, M.(1995).The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution.IEEE/ACM Transactions on Networking,3(1),31-41.
-
Boman, K.,Horn, G.,Howard, P.,Niemi, V.(2002).UMTS Security.Electronics & Communication Engineering Journal,14(5),191-204.
-
Chen, H.B.,Hsueh, S. C.(2003).Light-weight Authentication and Billing in Mobile Communications.Proceedings of the 37th IEEE International Carnahan Conference on Security Technology,Taipei, Taiwan:
-
Dai, Y.,Zhang, L.(2003).A Security Payment Scheme of Mobile E-Commerce.Proceedings of the International Conference on Communication Technology,2,949-952.
-
Mobile Payment Systems
-
Diffie, W.,Hellman, M.(1976).New Directions in Cryptography.IEEE Transactions on Information Theory,22(6),644-654.
-
Mobile Commerce Report
-
ElGamal, T.(1985).A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.IEEE Transactions on Information Theory,31(4),469-472.
-
Foo, E.,C. Boyd(1998).Passive Entities: A Strategy for Electronic Payment Design.Proceedings of the 5th Australasian Conference on Information Security and Privacy, LNCS 1841
-
Foo, E.,C. Boyd(1998).A Payment Scheme using Vouchers.Proceedings of the Financial Cryptology Conference, LNCS 1465
-
Ginzboorg, P.(2000).Seven Comments on Charging and Billing.Communications of the ACM,43(11),89-92.
-
Grecas, C.F.,Maniatis, S. I.,Venieris, I. S.(2003).Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration.Mobile Networks and Applications,8(2),145-150.
-
Herzberg, A.(2003).Payments and Banking with Mobile Personal Devices.Communications of the ACM,46(5),53-58.
-
Horn, G.,Preneel, B.(2000).Authentication and Payment in Future Mobile Systems.Journal of Computer Security,8,183-207.
-
Jin, L.,Ren, S.,Feng, L.,Hua, G. Z.(2002).Research on WAP Client Supports SET Payment Protocol.IEEE Wireless Communications,9(1),90-95.
-
Kalakota, R.,Robinson, M.(2001).M-Business: the Race to Mobility.McGraw-Hill.
-
Kelsey, J.,Schneier, B.(1997).Conditional Purchase Orders.Proceedings of the 4th ACM Conference on Computer and Communications Security
-
Kim, M.A.,Lee, H. K.,Kim, S.W.,Lee, W. H.,Kang, E. K.(2002).Implementation of Anonymity-Based E-Payment System for M-Commerce.Proceedings of the IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions,1,363-366.
-
Lin, C. H.,Dow, C.R.(2001).Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems.Journal of Information Science and Engineering,17,549-573.
-
Lin, T. H.,Shin, K. G.(1998).Damage Assessment for Optimal Rollback Recovery.IEEE Transactions on Computers,47(5),603-613.
-
Naruse, K.(2002).Findings of the Mobile-Users Survey.ECOM Journal,4,52-57.
-
Subscriber growth
-
Pagliusi, P.S.(2000).A Contemporary Foreword on GSM Security.Proceedings of International Conference on Infrastructure Security, LNCS 2437
-
Park, T.,Woo, N.,Yeom, H. Y.(2002).An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems.IEEE Transactions on Mobile Computing,1(4),265-277.
-
Park, T.,Woo, N.,Yeom, H. Y.(2003).An Efficient Recovery Scheme for Fault-Tolerant Mobile Computing Systems.Future Generation Computer Systems,19(1),37-53.
-
Samfat, D.,Molva, R.,Tsudik, G.(1994).Authentication of Mobile Users.IEEE Network, Special Issue on Mobile Communications Technologies,8(2),26-34.
-
Schneier, B.(1996).Applied Cryptography.New York:John Wiley and Sons.
-
Senn, J. A.(2000).The Emergence of M-Commerce.IEEE Computer,33(12),148-150.
-
Shelfer, K. M.,Procaccino, J. D.(2002).Smart Card Evolution.Communications of the ACM,45(7),83-88.
-
Sirbu, M.A.(1997).Credits and Debits on the Internet.IEEE Spectrum,34(2),23-29.
-
Stach, J. F.,Park, E. K.,Makki, K.(1999).Performance of An Enhanced GSM Protocol Supporting Non-Repudiation of Service.Computer Communications,22(7),675-680.
-
Tsalgatidou, A.,Pitoura, E.(2001).Business Models and Transactions in Mobile Electronic Commerce: Requirements and Properties.Computer Networks,37,221-236.
-
Varshney, U.(2002).Mobile Payments.IEEE Computer,35(12),120-121.
-
Varshney, U. R.,Vetter, J.,Kalakota, R.(2000).Mobile Commerce: A New Frontier.IEEE Computer,33(10),32-38.
-
Zheng, X.,Chen, D.(2003).Study of Mobile Payments System.Proceedings of the IEEE International Conference on E-Commerce
|