Mobile payments in global markets using biometrics and cloud
暂无分享,去创建一个
[1] Upkar Varshney,et al. Mobile Payments , 2002, Computer.
[2] Suresh Sankaranarayanan,et al. Biometric security mechanism in Mobile paymentts , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[3] Stephanie Boehm. M Commerce Technologies Services And Business Models , 2016 .
[4] H. Harb,et al. SecureSMSPay: Secure SMS Mobile Payment model , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
[5] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[6] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[7] Guangjie Han,et al. A Multiqueue Interlacing Peak Scheduling Method Based on Tasks’ Classification in Cloud Computing , 2018, IEEE Systems Journal.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Deren Chen,et al. Study of mobile payments system , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[10] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[11] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[12] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[13] George Ghinea,et al. Managing NFC payment applications through cloud computing , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[14] Chris Clifton,et al. Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.
[15] Qingkai Zeng,et al. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing , 2012 .
[16] Matti Rossi,et al. Mobile banking services , 2004, CACM.
[17] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[18] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[19] Takahiro Hara,et al. A Multi-Objective Optimization Scheduling Method Based on the Ant Colony Algorithm in Cloud Computing , 2015, IEEE Access.
[20] Farouk Kamoun,et al. A SET based approach to secure the payment in mobile commerce , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[21] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[22] Bala Srinivasan,et al. A secure account-based mobile payment protocol , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[23] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[24] Upkar Varshney. Representative democracy and the profession , 2002 .
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[27] Sugata Sanyal,et al. A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices , 2011, ArXiv.
[28] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..