期刊文献+

手机安全交易模型研究 被引量:3

Research on Security Scheme of Mobile Business
原文传递
导出
摘要 随着手机增值服务业务日益繁荣,手机支付也成为一种流行的支付方式。执行效率和安全性是手机支付的两个关键问题。根据手机支付金额的不同,提出不同的手机支付方式,并在此基础上提出了相对应的3种安全支付模型:极小额安全交易模型、小额安全交易模型和大额安全交易模型。同时,分析了这3种支付模型的执行效率和安全性。 With the development of mobile phone value-added service, payment with mobile phone has become a popular mode. Executing efficiency and security are two key problems in payment with mobile phone. The three modes of payment with mobile phone, including secure minimal amount payment mode, secure small amount payment mode and secure large amount payment mode, are proposed according to the amount of paid money, the related three security schemes for mobile business are designed, and the executing efficiency and security of the three schemes are analyzed.
作者 孙萧寒
出处 《信息安全与通信保密》 2009年第10期78-79,共2页 Information Security and Communications Privacy
基金 渭南师范学院研究生基金资助项目(09YKZ023)
关键词 手机支付 手机交易 移动电子商务 payment with mobile phone mobile business mobile electronic commerce
  • 相关文献

参考文献7

二级参考文献33

  • 1牛云,罗守山.安全电子交易协议的一种改进[J].计算机工程与设计,2004,25(7):1047-1048. 被引量:5
  • 2聂捷楠,葛波,任伟.基于手机短信的电子商务平台设计与实现[J].微计算机信息,2006,22(09X):220-222. 被引量:13
  • 3W3C.Micropayment Overview.http://www.w3c.org/Ecommerce/Micropayments/Overview.htm
  • 4William Stallings. Network Security Essentials:Applications and Standards[S].Published by Prentice-Hall,Inc,2000:68~69
  • 5Ronald L Rivest,Adi Shamir. Payword and Micromint:Two simple micropayment schemes.http://theory.lcs. mit. edu/~rivest/Rivest Shamir-mpay.ps
  • 6J D Tygar. Atomicity in electronic commerce[J].NetWorker, 1998; 2 (2)
  • 7Sirbu M,Tygar J D.Net Bill:an Internetcommerce system optimized for network delivered services[C].In:Proceedings of the IEEE COMPCON' 95,Los Alamitos,CA:IEEE Computer Society Press, 1995:20~25
  • 8Mondex Services: Cash Payment Types, Internet Card Processing.http://www.cybercash.com/cybercash/services/
  • 9RFC 1898 - CyberCash Credit Card Protocol Version 0.8[S]
  • 10Steve Glassman et al.TheMilliCent Protocol for Inexpensive Electronic Commercehttp://www.nillicentcom/works/details/papers/millicent-w3c4/millicent.html

共引文献48

同被引文献17

  • 1手机上网,我们该尽哪些责任?[J].信息安全与通信保密,2006,28(7):55-55. 被引量:1
  • 2刘建奇,王以刚.智能手机信息安全防范系统设计与研究[J].信息安全与通信保密,2007,29(2):111-112. 被引量:5
  • 3王宇伟,张辉.基于手机的NFC应用研究[J].中国无线电,2007(6):3-8. 被引量:31
  • 4白洁.手机银行,谁为安全买单?[J].信息安全与通信保密,2007,29(9):38-40. 被引量:2
  • 5OKK,C0SKUN V, 0ZDENIZCI B, et al. Current Benefitsand Future Directions of NFC Services[C]//2010International Conference on Education andManagement Technology. Cairo:IEEE, 2010:334-338.
  • 6Kinpo. NFC:Near-Field Communication. (2011-12-10)[2012-04-10]. http://wenku. baidu. com. 20110425_NFC.
  • 7NFC Forum. Smart posters. (2011-11-18) [2012-03-10].http://www. nfc-forum. org/resources/white_papers/.
  • 8CHENG H C, CHEN J W, CHI T Y, et al. A Generic Modelfor NFC—based Mobile Commerce[C]//2009 11thInternational Conference on Advanced CommunicationTechnology. Phoenix Park: IEEE, 2009:2009-2014.
  • 9MARCUS A, DAVIDZON G,LAW D, et al. UsingNFC-enabled Mobile Phones for Public Health inDeveloping Countries[C]// 2009 First InternationalWorkshop on Near Field Communication. Hagenberg:IEEE,2009:30-35.
  • 10CHEN Long-biao, PAN Gang, LI Shi-jian. Touch-drivenInteraction via an NFC-enabled Smartphone[C]//2012 IEEE International Conference on PervasiveComputing and Communications. Lugano:IEEE, 2012:504-506.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部