[1]
Oliver. Jorns; Oliver. Jung; Gerald. Quirchmayr. A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. Second International Conference on Availability, Reliability and Security (ARES'07)ed. (2007).
DOI: 10.1109/ares.2007.16
Google Scholar
[2]
Huiqi. Lu; Claret-Tournier.F.; Chatwin.C.; Young R.C.D. M-Commerce Secured Using Web-Enabled Mobile Biometric Agents. Web Intelligence and Intelligent Agent Technology Workshops, 2007 IEEE/WIC/ACM International Conferences oned. 2007: 480-483.
DOI: 10.1109/wi-iatw.2007.80
Google Scholar
[3]
LIU. Ming-hui; XIN. Yang; YANG. Yi-xian; LI. Zhong-xian. A Card-not-Present Payment System Using Direct Anonymous Attestation Mechanism [J]. Journal of Beijing University of Posts and Telecommunications, 2008, Vol. 31(No. 4): P90-93.
Google Scholar
[4]
Sun. Yanbin, Gu. Lize, Sun. Yan, et al. Analysis and improvement of the CS-based fair exchange protocol [J]. Journal On Communications, 2010, (09).
Google Scholar
[5]
Martinez-Pelaez R, Satizabal C, Rico-Novella F, et al. Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. Availability, Reliability and Security, 2008 ARES 08 Third International Conference oned. 2008: 701-708.
DOI: 10.1109/ares.2008.101
Google Scholar
[6]
Ling. Zhang; Jianping. Yin; Mengjun. Li. A Novel Off-line Anonymous and Divisible Digital Cash Protocol Utilizing Smart Card for Mobile Payment. Communications and Networking in China, 2006 ChinaCom '06 First International Conference oned.: 1-6.
DOI: 10.1109/chinacom.2006.344665
Google Scholar
[7]
Cao. Jianwen, Yang. Xiaodong. Research on security of identity-based off-line electronic payment [J]. Computer Engineering And Design, 2007, (07).
Google Scholar
[8]
Fan. Limin, Liao. Jianxin. Fair Mobile Micropayment Protocol [J]. Journal Of Electronics & Information Technology , 2007, (11).
Google Scholar
[9]
Tian. Shuhua, Chen. Ligui, Li. Jianru. Fairness analysis of electronic payment protocol based on offiine TTP [J]. Journal Of Computer Applications , 2009, (07).
DOI: 10.3724/sp.j.1087.2009.01839
Google Scholar
[10]
Ling Z, Jian ping Y, Yu bin Z. An Anonymous Digital Cash and Fair Payment Protocol Utilizing Smart Card in Mobile Environments. Grid and Cooperative Computing Workshops, 2006 GCCW '06 Fifth International Conference oned.: 335-340.
DOI: 10.1109/gccw.2006.18
Google Scholar
[11]
L. Chen CK, K. G. Paterson. Concurrent signatures [J]. Advances in Cryptology - EUROCRYPT, 2004, 3027(Springer-Verlag): 287 – 305.
Google Scholar
[12]
Han J, Qiuliang X, Chenghui Z. Convertible Perfect Concurrent Signature Protocol. Computational Intelligence and Security (CIS), 2010 International Conference oned.: 352-356.
DOI: 10.1109/cis.2008.77
Google Scholar
[13]
Jianhong Z, Shengnan G. An Efficient Identity-Based Concurrent Signature Scheme. Information Technology and Applications (IFITA), 2010 International Forum oned.: 270-273.
Google Scholar
[14]
Xiao T, Yi-ming Z. Unlinkable Multi-party Concurrent Signatures. Communications and Mobile Computing (CMC), 2010 International Conference oned.: 228-232.
DOI: 10.1109/cmc.2010.60
Google Scholar
[15]
Zhenjie H, Jianneng C. Certificate-Based Perfect Concurrent Signatures. Multimedia Information Networking and Security (MINES), 2010 International Conference oned.: 526-530.
DOI: 10.1109/mines.2010.117
Google Scholar
[16]
Jiang. Han, Zhang. Zhong, Xu. Qiuliang. Analysis and Improvement of a Perfect Concurrent Signature Protocol [J]. Journal Of Beijing University Of Posts And Telecommunications , 2009, (02).
Google Scholar
[17]
SU SILOW MY, ZHANG F. Perfect concurrent signature schemes [J]. ICICS2004[C], 2004, (Springer-Verlag, Berlin): 14-26.
Google Scholar
[18]
Wang. Yadi, Su. Nina, Han. Jihong, Wang. Na. Formal Analysis of Cryptographic Protocols [M]. BeiJing: [M](CMP) China Machine Press, 2006. 7.
Google Scholar