Research on mobile commerce payment management based on the face biometric authentication
暂无分享,去创建一个
Zhang Li | Chen Dan | Wang Feng | Zhou Peiyan | Jiyan Zhou
[1] Chung-Ren Ou,et al. SETNR/A: an agent-based secure payment protocol for mobile commerce , 2010, Int. J. Intell. Inf. Database Syst..
[2] Oscar Déniz-Suárez,et al. An Incremental Learning Algorithm for Face Recognition , 2002, Biometric Authentication.
[3] Lida Xu,et al. Business Intelligence for Enterprise Systems: A Survey , 2012, IEEE Transactions on Industrial Informatics.
[4] Lida Xu,et al. A new type of recurrent fuzzy neural network for modeling dynamic systems , 2001, Knowl. Based Syst..
[5] Yong Chen,et al. A System Framework of Security Management in Enterprise Systems , 2013 .
[6] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[7] Jian Yang,et al. Two-dimensional discriminant transform for face recognition , 2005, Pattern Recognit..
[8] Xiaomin Wang,et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .
[9] X. Qin,et al. ERP research, development and implementation in China: an overview , 2005 .
[10] Lin Wang,et al. Electronic commerce international logistics performance influence factor analysis , 2015, Int. J. Mob. Commun..
[11] Mohamed Kouta,et al. Modified SET protocol for mobile payment: An empirical analysis , 2010, 2010 2nd International Conference on Software Technology and Engineering.
[12] Yuguang Fang,et al. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Chin-Chen Chang,et al. Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..
[14] Dong Hoon Lee,et al. Password-Authenticated Key Exchange between Clients with Different Passwords , 2002, ICICS.
[15] Chen Lizhi. User Authentication Mechanism Based on Dynamic Password and Its Security Analysis , 2002 .
[16] Lida Xu,et al. Dynamic recurrent neural networks for a hybrid intelligent decision support system for the metallurgical industry , 1999, Expert Syst. J. Knowl. Eng..
[17] Ma Hui-min. Research and Realization of Authentication Technique Based on OTP , 2004 .
[18] Li D. Xu,et al. Integrating knowledge management and ERP in enterprise information systems , 2006 .
[19] Liu Jinye,et al. An Anonymous Authentication Scheme for Mobile Communication Based on Third-Party , 2012 .
[20] Li Ying Jin,et al. Effects of platformization strategy on continuance intention of mobile messaging apps , 2016, Int. J. Mob. Commun..
[21] Zhang Guan-yu. Identity authentication protocol in GSM network environment based on elliptic curve cryptosystem , 2004 .
[22] Xiaomin Zhu,et al. A system model and protocol for mobile payment , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).
[23] Ji Yi. The Research of Identity Authentication and Authorization under Java2 , 2003 .
[24] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[25] Richa Singh,et al. Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.
[26] Chin-Chen Chang,et al. An efficient multi-server password authenticated key agreement scheme using smart cards with access control , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[27] Elisa Bertino,et al. Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.
[28] Chun-I Fan,et al. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.
[29] L. Harn. Public-key cryptosystem design based on factoring and discrete logarithms , 1994 .
[30] Pan Wang,et al. A novel Bayesian learning method for information aggregation in modular neural networks , 2010, Expert Syst. Appl..
[31] Wang Feng,et al. Research on Enterprise Operation with Finance and Accounting Cost Calculation Integration Framework System Based on IT Perspective , 2012 .
[32] Costas Vassilakis,et al. Context management for m-commerce applications: determinants, methodology and the role of marketing , 2012, Information Technology and Management.
[33] C. Laih,et al. New Signature Schemes Based on Factoring and Discrete Logarithms (Special Section on Cryptography and Information Security) , 1997 .
[34] Zhuming Bi,et al. Support vector machine and ROC curves for modeling of aircraft fuel consumption , 2015 .
[36] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Sun Xiao-mei. Improved Scheme for One-time Password Authentication , 2006 .
[38] Xiaohong Guan,et al. An SVM-based machine learning method for accurate internet traffic classification , 2010, Inf. Syst. Frontiers.
[39] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[40] Dai Zhan-feng. A Supporting Multi-Mode Application Single Sign-On Scheme Based on PKI/PMI , 2009 .
[41] Hua Yu,et al. A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..
[42] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[43] Yingjiu Li,et al. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..
[44] Antonio F. Gómez-Skarmeta,et al. Payment frameworks for the purchase of electronic products and services , 2012, Comput. Stand. Interfaces.
[45] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[46] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[47] W.-S. Juang,et al. Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..
[48] Konstantinos N. Plataniotis,et al. Face recognition using kernel direct discriminant analysis algorithms , 2003, IEEE Trans. Neural Networks.
[49] Alan L. Yuille,et al. Feature extraction from faces using deformable templates , 2004, International Journal of Computer Vision.
[50] Lida Xu,et al. A neural network representation of linear programming , 2000, Eur. J. Oper. Res..
[51] G. A. Swanson,et al. Systems science and enterprise integration, technological economics and the theory of material flow , 2009 .