Systematic survey of mobile payments, protocols, and security infrastructure
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shopping …
are widely used by smartphones for utility payments, bill payments, and online shopping …
A three-level gateway protocol for secure m-commerce transactions using encrypted OTP
Mobile commerce, which began in ancient times as the trade system, has grown in the
ultramodern age due to improvements in technology, the Internet, the use of Financial …
ultramodern age due to improvements in technology, the Internet, the use of Financial …
NFC mobile transactions and authentication based on GSM network
This paper describes a mobile payment system for merchant micropayments, which can be
build on existing GSM and NFC architecture components. Many mobile payment methods …
build on existing GSM and NFC architecture components. Many mobile payment methods …
Mobile payment systems
J Téllez, S Zeadally - Cham, Switzerland: Springer, 2017 - Springer
In the last two decades, we have seen significant technological advances in computing,
networking, storage, and processing technologies. All these advances have led to the …
networking, storage, and processing technologies. All these advances have led to the …
Mobile payments: A proposal for a context-oriented approach based on socio-technical theory
T Apanasevic, N Arvidsson… - Journal of Innovation …, 2018 - journalengineering.fe.up.pt
A recent review of mobile payment research by Dahlberg et al.(2015) concludes that there is
a need to synthesise this research area by studying contexts in which innovation is carried …
a need to synthesise this research area by studying contexts in which innovation is carried …
Lower bounds on streaming algorithms for approximating the length of the longest increasing subsequence
A Gál, P Gopalan - SIAM Journal on Computing, 2010 - SIAM
We show that any deterministic streaming algorithm that makes a constant number of passes
over the input and gives a constant factor approximation of the length of the longest …
over the input and gives a constant factor approximation of the length of the longest …
An anonymous secure payment protocol in a payment gateway centric model
JT Isaac, S Zeadally - Procedia Computer Science, 2012 - Elsevier
In the last few years, a significant number of mobile payment systems have been proposed.
Most of them have been based on a scenario where all the entities are directly connected to …
Most of them have been based on a scenario where all the entities are directly connected to …
A secure NFC mobile payment protocol based on biometrics with formal verification
SS Ahamad, I Al-Shourbaji… - International Journal of …, 2016 - inderscienceonline.com
In this paper, we propose a secure NFC mobile payment protocol based on biometrics
(SNMPBs) using wireless public key infrastructure (WPKI) and universal integrated circuit …
(SNMPBs) using wireless public key infrastructure (WPKI) and universal integrated circuit …
Mobile Payment Protocol with Deniably Authenticated Property
Y Liu, W Huang, M Zhuo, S Zhou, M Li - Sensors, 2023 - mdpi.com
Mobile payment services have been widely applied in our daily life, where users can
conduct transactions in a convenient way. However, critical privacy concerns have arisen …
conduct transactions in a convenient way. However, critical privacy concerns have arisen …
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity
V Sureshkumar, R Anitha, N Rajamanickam… - Computers & Electrical …, 2017 - Elsevier
In the current scenario, mobile web payment provides a standard platform to the Internet
users for online digital goods shopping. Though the majority of online transactions use …
users for online digital goods shopping. Though the majority of online transactions use …