Research on identity authentication management in mobile commerce based on ECC and dynamic fingerprint key
暂无分享,去创建一个
Li Zhang | Feng Wang | Yingbo Liu | Peiyan Zhou | Zhaojun Xu
[1] Jin Ki Kim,et al. Selection of digital convergence strategy for telecommunications carriers , 2014, Int. J. Mob. Commun..
[2] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[3] Ronald Mraz. Secure Blue: an architecture for a scalable, reliable high volume SSL Internet server , 2001, Seventeenth Annual Computer Security Applications Conference.
[4] Robert J. Kauffman,et al. Event history, spatial analysis and count data methods for empirical research in information systems , 2011, Information Technology and Management.
[5] Bih-Huang Jin,et al. Analysis of emerging technology adoption for the digital content market , 2012, Inf. Technol. Manag..
[6] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[7] Cheng-Chi Lee,et al. A remote user authentication scheme using hash functions , 2002, OPSR.
[8] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[9] Kin Keung Lai,et al. An empirical analysis of mobile internet acceptance from a value-based view , 2012, Int. J. Mob. Commun..
[10] Costas Vassilakis,et al. Context management for m-commerce applications: determinants, methodology and the role of marketing , 2012, Information Technology and Management.
[11] Young Bong Chang,et al. Does RFID improve firms’ financial performance? an empirical analysis , 2011, Inf. Technol. Manag..
[12] Erik Bohlin,et al. Empirical exploration of factors that determine multiple mobile phone subscriptions , 2014, Int. J. Mob. Commun..
[13] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.
[14] Chou Chen Yang,et al. Secure authentication scheme for session initiation protocol , 2005, Comput. Secur..
[15] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[16] Wang Feng,et al. Research on Enterprise Operation with Finance and Accounting Cost Calculation Integration Framework System Based on IT Perspective , 2012 .
[17] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[18] Robert J. Kauffman,et al. Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..
[19] Shashank Khanvilkar,et al. Flexi-tunes: an integrated architecture based on flexible tunnels for secure and scalable multimedia comm , 2006 .
[20] X. Qin,et al. ERP research, development and implementation in China: an overview , 2005 .
[21] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Ashok Kumar Das,et al. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..
[23] Robert J. Kauffman,et al. Internet-based selling technology and e-commerce growth: a hybrid growth theory approach with cross-model inference , 2011, Inf. Technol. Manag..
[24] T. Parthasarathy,et al. Development of a Mathematical Formula for the Calculation of Fingerprint Probabilities Based on Individual Characteristics , 1977 .
[25] Mark E. Nissen,et al. Agent-Based Supply Chain Integration , 2001, Inf. Technol. Manag..
[26] Ching-Wen Lin,et al. Trading signals analysis of mobile trading services , 2013, Int. J. Mob. Commun..
[27] Yi Liu,et al. Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things , 2012, Information Technology and Management.
[28] Sunil Erevelles,et al. Consumer Satisfaction for Internet Service Providers: An Analysis of Underlying Processes , 2003, Inf. Technol. Manag..
[29] Qin Su,et al. Analysing relational benefits in e‐business environment from behavioural perspective , 2009 .
[30] Li D. Xu,et al. Integrating knowledge management and ERP in enterprise information systems , 2006 .
[31] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[32] Anang Hudaya Muhamad Amin,et al. Biologically inspired mobile agent-based sensor network (BIMAS) , 2014, Int. J. Mob. Commun..
[33] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[34] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[35] Pankaj Setia,et al. Realizing business value of agile IT applications: antecedents in the supply chain networks , 2008, Inf. Technol. Manag..
[36] Huimin Liu,et al. Modelling and analysis techniques for cross‐organizational workflow systems , 2009 .