|
[1]Ronald L. Rivest, Adi Shamir “PayWord and MicroMint: Two Simple Micropayment Schemes,” LNCS, vol. 1189, Springer Verlag, 1997, pp. 69-87. [2]Sunhyoung Kim, Wonjun Lee “A PayWord-Based Micropayment Protocol Supporting Multiple Payments,” Proceedings of 12th IEEE International Conference on Computer Communications and Networks, Dallas, TX, USA, October 2003, pp. 609-612. [3]Yi Mu, Vijay Varadharajan, Yan-Xia Lin “New Micropayment Schemes Based on PayWords,” Proceedings of the Second Australasian Conference on Information Security and Privacy, 1997, pp. 283-293. [4]Ching-Nung Yang, Chih-Cheng Wu, Chih-Yang Chiu, Shin-Yan Chiou “MSRC: (M)icropayment (S)cheme with ability to (R)eturn (C)hanges,” Mathematical and Computer Modeling, vol. 58, no. 1-2, pp. 96–107, 2013. [5]Xiaoling Dai, John Grundy, “NetPay: An off-line, decentralized micro-payment system for thin-client applications”, Electronic Commerce Research and Applications 6 (2007) 91–101. [6]Alex Roehrs, Cristiano Andre da Costa, Jorge Luis Victoria Barbosa “A Proposal of a Mobile Payment System based on Android” , 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 617-622. [7]Sana Nseir, Nael Hirzallah, Musbah Aqel “NetPay: A Secure Mobile Payment System using QR Code”, 2013 5th International Conference on Computer Science and Information Technology (CSIT) 111–114. [8]Dany E. Saputra, Firman Azhari, Ventje J. L. Engel, I.G.B. Baskara Nugraha, Suhono H. Supangkat “Integrated Payment System for Micro Payment”, 2013 International Conference on ICT for Smart Society (ICISS) 1–4. [9]S. S. Manvi, L. B. Bhajantri, M. A. Vijayakumar “Secure Mobile Payment System inWireless Environment”, 2009 International Conference on Future Computer and Communication 31–35. [10]Vorugunti Chandra Sekhar, Mrudula Sarvabhatla “Secure Lightweight Mobile Payment Protocol Using Symmetric Key Techniques”, 2012 International Conference on Computer Communication and Informatics 1–6. [11]Xi Li, Wei Zhu, Mingxing He “Secure Remote Mobile Payment Architecture and Application”, 2010 International Symposium on Computer, Communication, Control and Automation 487–490. [12]Abdulkareem Aljohan, Khalid Al-Begain “Transaction – Centric Mobile-Payment classification model”, 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies 68–74. [13]Chun-l Fan, Yu-Kuang Liang, Chien-Nan Wu “An Anonymous Fair Offline Micropayment Scheme”, Information Society (i-Society), 2011 International Conference on 377-381. [14]Yoon-Su Jeong, Ning Sun, Sang-Ho Lee “IPTV Micropayment System based on Hash Chain using RFID-USB Module”, 2010 IEEE 34th Annual Computer Software and Applications Conference on 155-160. [15]Mohammad Mehdi Hossein Pour, Ab Razak Che Husin, Halina Mohamed Dahlan “BESTCASH: A new E-Cash for Micropayment”, Innovation Management and Technology Research (ICIMTR), 2012 International Conference on 580-584. [16]Yang Jiaqi, Ren Xuechen “Mobile E-commerce security analysis based on DEMATEL”, 2011 E -Business and E -Government (ICEE), 2011 International Conference on 1–4. [17]S. Nagalakshmi, R. Sumathi “An Efficient Mobile Commerce Explorer for Mobile User’s Behavior Pattern Mining and Prediction”, Information Communication and Embedded Systems (ICICES), 2014 International Conference on 1–7. [18]Ting Lei, Jian-wei Cao “The Relationship Study Between the Mobile Commerce Personalized Service Scene and Customer Behavior”, Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on 467–471. [19]Hao Huang, Lu Liu, Jianjun Wang “Diffusion of Mobile Commerce Application in the Market”, Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on 485. [20]Xining Li, Guillaume Autran “Implementing an Mobile Agent Platform for M-commerce”, 2009 33rd Annual IEEE International Computer Software and Applications Conference on 40-45. [21]Weidong Guo “Research on Mobile Commerce Based on RFID”, Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE International Conference on 853-857. [22]陳德富,《行動商務與行動顧客關係管理》 [23]Norman Sadeh,《M-Commerce : Technologies, Services , and Business Models》Publisher: John Wiley & Sons, Inc, 2002. [24]Ravi Kalakota , Marcia Robinson,《M-Commerce : The Race to Mobility》Publisher: McGraw-Hill , 2002. [25]郭美孜,《Fintech:科技掀起的一場金融革命》,中時電子報,2016.04.14 [26]洪可容,《解密改變貨幣流通方式的新名詞- FinTech 金融科技》,財經新報,2016.05.03 [27]劉浩廷,《1+1>2:傳統金融業投資FinTech的綜效》,工商時報,2015.06.16 [28]William Stallings,《Cryptography and Network Security Principles and Practice Sixth Edition》Publisher: Prentice Hall,2013. [29]Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang “A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices” The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , Melbourne, Australia, 16-18, 2013. [30]Ronald L. Rivest, Adi Shamir, Leonard Adleman “A method for obtaining digital signatures and public-key cryptosystems” Comm. ACM, vol. 21, PI. 120-126. 1978. [31]Ching-Nung Yang, Hsu-Tun Teng “An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment” E-Commerce, 2003. CEC 2003. IEEE International Conference on45 – 48. [32]Hong Wang, Jialin Ma, Jing Sun “Micro-payment Protocol Based on Multiple Hash Chains” 2009 Second International Symposium on Electronic Commerce and Security 71 – 74.
|