References
- W. Liu, X. Wang and W. Peng, “State of the Art: Secure Mobile Payment,” in IEEE Access, vol. 8, pp. 13898-13914, (2020). doi: https://doi.org/10.1109/ACCESS.2019.2963480
- K. Fan, H. Li, W. Jiang, C. Xiao and Y. Yang, “Secure Authentication Protocol for Mobile Payment,” in Tsinghua Science and Technology, vol. 23, no. 5, pp. 610-620, Oct. (2018) doi: https://doi.org/10.26599/TST.2018.9010031
- J. Li, J. Wang, S. Wangh and Y. Zhou, “Mobile Payment With Alipay: An Application of Extended Technology Acceptance Model,” in IEEE Access, vol. 7, pp. 50380-50387, (2019) doi: https://doi.org/10.1109/ACCESS.2019.2902905
- W. K. Zhang and M. J. Kang, “Factors Affecting the Use of Facial-Recognition Payment: An Example of Chinese Consumers,” in IEEE Access, vol. 7, pp. 154360-154374, (2019) doi: https://doi.org/10.1109/ACCESS.2019.2927705
- M. Obaid, Z. Bayram and M. Saleh, “Instant Secure Mobile Payment Scheme,” in IEEE Access, vol. 7, pp. 55669-55678,(2019) doi: https://doi.org/10.1109/ACCESS.2019.2913430
- Y. Chen, W. Xu, L. Peng and H. Zhang, “Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT,” in IEEE Access, vol. 7, pp. 15210-15221, (2019) doi: https://doi.org/10.1109/ACCESS.2019.2894062
- K. Yeh, “A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments,” in IEEE Systems Journal, vol. 12, no. 2, pp. 2027-2038, June (2018) doi: https://doi.org/10.1109/JSYST.2017.2668389
- Y. Yang, H. Lin, X. Liu, W. Guo, X. Zheng and Z. Liu, “Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment,” in IEEE Access, vol. 7, pp. 140818-140832, (2019) doi: https://doi.org/10.1109/ACCESS.2019.2943356
- W. Yu, C. G. Yan, Z. Ding, C. Jiang and M. Zhou, “Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns,” in IEEE Transactions on Automation Science and Engineering, vol. 13, no. 2, pp. 647-662, April (2016) doi: https://doi.org/10.1109/TASE.2014.2362819
- Mario Fedrizzi & Viviana Ventre, “Fraud measurement using ordered weighted aggregation”, Journal of Interdisciplinary Mathematics, 11:1, 99-113, 2008. doi: https://doi.org/10.1080/09720502.2008.10700545
- Dafik, R. Nisviasari, T. K. Maryati, I. H. Agustin & M. Venkatachalam, “On local super antimagic total face coloring and the application in developing a cipher block chaining key”, Journal of Discrete Mathematical Sciences and Cryptography, 24:4, 1101-1111,(2021). doi: https://doi.org/10.1080/09720529.2021.1882162
- Furat Noori Abed & Mehdi Ebady Manaa, “A proactive secure file approach using a block chain technique”, Journal of Discrete Mathematical Sciences and Cryptography, 23:7, 1447-1453, (2020). doi: https://doi.org/10.1080/09720529.2020.1727610
- Ghada Abdelmouez, M. Abdelhady, Fathy S. Helail & Abdellatif A. Elkouny, “New DES based on elliptic curves”, Journal of Discrete Mathematical Sciences and Cryptography, 14:4, 305-315, (2011). doi: https://doi.org/10.1080/09720529.2011.10698338
- Neeraj Pratap & Shwetank, “Development of spectral signatures and classification using hyperspectral face recognition”, Journal of Interdisciplinary Mathematics, 23:2, 453-462, (2020) doi: https://doi.org/10.1080/09720502.2020.1731957