A new mobile payment system with formal verification (original) (raw)

A Secure and Optimized Proximity Mobile Payment Framework with Formal Verification

Siba Udgata

International Journal of E-Services and Mobile Applications, 2014

View PDFchevron_right

A survey of electronic signature solutions in mobile devices

Antonio Ruiz-Martínez

Journal of Theoretical …, 2007

View PDFchevron_right

Analysis of Elliptic Curve Cryptography for Mobile Banking

Swapnali Ghosalkar

International journal of engineering research and technology, 2014

View PDFchevron_right

IJERT-Analysis of Elliptic Curve Cryptography for Mobile Banking

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption

Siba Udgata

International Journal of Information Security and Privacy, 2012

View PDFchevron_right

Public Key Cryptography for Mobile Payment

Sattar Aboud

Ubiquitous Computing and Communication Journal, 2010

View PDFchevron_right

Privacy in new mobile payment protocol

Rozaini Roslan

2008

View PDFchevron_right

An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security

Adebayo Abayomi-Alli

SN Computer Science, 2020

View PDFchevron_right

A lightweight and private mobile payment protocol by using mobile network operator

Rozaini Roslan

2008 International Conference on Computer and Communication Engineering, 2008

View PDFchevron_right

An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks

mohammad sabzinejad Farash

Information Technology And Control, 2015

View PDFchevron_right

Efficient certificate path validation and its application in mobile payment protocols

Jordi Forné, Francisco Rico-Novella

ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 2008

View PDFchevron_right

A proposed architecture for secure two-party mobile payment

Jacqueline Rice

2009

View PDFchevron_right

Improving e-payment security using Elliptic Curve Cryptosystem

Jafarullah M

Electronic Commerce Research, 2010

View PDFchevron_right

IJERT-A Secure Transaction Scheme with Certificateless Cryptographic Primitives Based Mobile Payments

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2019

View PDFchevron_right

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography

유기영 교수님, Goutham Reddy Alavalapati

View PDFchevron_right

Secure mobile payment framework based on UICC with formal verification

Siba Udgata

International Journal of Computational Science and Engineering, 2014

View PDFchevron_right

An electronic Signature Infrastructure for mobile Devices

MARIA TERESA GARCIA MARTINEZ

ISSE 2005 — Securing Electronic Business Processes, 2005

View PDFchevron_right

Anonymous Split E-Cash—Toward Mobile Anonymous Payments

Alfredo Rial

ACM Transactions on Embedded Computing Systems, 2015

View PDFchevron_right

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

Shun Der Chen

International Journal of Electronic Security and Digital Forensics, 2019

View PDFchevron_right

Public Key based Security Scheme for Digital Payment Transactions

IJIRT Journal

View PDFchevron_right

A Secure Mobile Payment Framework in MANET Environment

Siba Udgata

International Journal of E-Business Research, 2013

View PDFchevron_right

A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography

Prabhu Kavin B

International Journal of Innovative Technology and Exploring Engineering, 2019

View PDFchevron_right

Secure and efficient protocol for mobile payments

Alwyn Pais

Proceedings of the 10th international conference on Electronic commerce - ICEC '08, 2008

View PDFchevron_right

An improved hybrid scheme for e-payment security using elliptic curve cryptography

Olufunke Vincent

International journal of information technology, 2020

View PDFchevron_right

New digital signature protocol based on elliptic curves

Jaouad Ettanfouhi

2013

View PDFchevron_right

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

mohammad sabzinejad Farash

Journal of King Saud University - Computer and Information Sciences, 2017

View PDFchevron_right