共 8 条
[3]
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement[J] . Yongjian Liao,Yichuan He,Fagen Li,Shijie Zhou. Computer Standards & Interfaces . 2018
[4]
Next generation cloud computing: New trends and research directions[J] . Blesson Varghese,Rajkumar Buyya. Future Generation Computer Systems . 2018
[5]
Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage[J] . Baoyuan Kang,Jiaqiang Wang,Dongyang Shao,Emilio Insfran. Mathematical Problems in Engineering . 2017
[6]
Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks[J] . Baoyuan Kang,Jiaqiang Wang,Dongyang Shao,Stefania Sardellitti. Mobile Information Systems . 2017
[7]
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing[J] . Zhen Qin,Jianfei Sun,Abubaker Wahaballa,Wentao Zheng,Hu Xiong,Zhiguang Qin. Computer Standards & Interfaces . 2016
[8]
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan[J] . Amoroso,Donald L,Magnier-Watanabe,Rémy. EN . 2012 (1)