[1]
J. Chen, C. Wang, Exploratory factor analysis approach for understanding consumer behavior toward using Chongqing City Card, Advanced Data Mining and Applications Lecture Notes in Computer Science, Vol. 6441, pp.561-567, (2010).
DOI: 10.1007/978-3-642-17313-4_58
Google Scholar
[2]
L. Honnegowda, S. Chan, and C. Tong Lau, Embedded electronic smart card for financial and healthcare information transaction. Journal of Advances in Computer Networks, Vol. 1, No. 1, Jan. (2013).
DOI: 10.7763/jacn.2013.v1.12
Google Scholar
[3]
The 11th Five-Year Plan on Electronic Commerce Development [OL], http: /www. sdpc. gov. cn/zcfb/zcfbtz/2007tongzhi/W020070620595393012331. pdf, 2009. 10. (In Chinese).
Google Scholar
[4]
M. Mohandes, A smart card management and application system. 2010 IEEE International Conference on Progress in Informatics and Computing (PIC). Vol. 2 p.1220 – 1225, 10-12 Dec. (2010).
DOI: 10.1109/pic.2010.5687971
Google Scholar
[5]
X. Zhao, W. Ge, T. Lu, Investigation based study on the environment and opportunities of mobile payment services in China, 2011 International Conference on E-Business and E -Government (ICEE) , pp.1-6, (2011).
DOI: 10.1109/icebeg.2011.5881337
Google Scholar
[6]
X. Li, W. Zhu; M. He, Secure remote mobile payment architecture and application, 2010 International Symposium on Computer Communication Control and Automation (3CA) , Vol. 1, p.487 – 490, 5-7 May (2010).
DOI: 10.1109/3ca.2010.5533752
Google Scholar
[7]
L. Han, Realization of campus card recharge through online banking. Information Technology, 2011 April.
Google Scholar
[8]
M. Bala Krishna, M.N. Doja, Symmetric key management and distribution techniques in wireless ad hoc networks. 2011 International Conference on Computational Intelligence and Communication Networks (CICN), p.727 – 731, 7-9 Oct. (2011).
DOI: 10.1109/cicn.2011.158
Google Scholar
[9]
M. Savari, M. Montazerolzohour, All about encryption in smart card. 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp.54-59. 26-28 June (2012).
DOI: 10.1109/cybersec.2012.6246122
Google Scholar