• OpenAccess
  • Building a Secure Mobile Payment Protocol in the Cloud  [MASS 2016]
  • DOI: 10.4236/jss.2016.47009   PP.59 - 63
  • Author(s)
  • Liping Du, Guifen Zhao, Ying Li
  • This paper is mainly to resolve the secure problems of mobile payment business which the remote payment is their main businesses. The identity authenticity of mobile payment user, the confidentiality and non repudiation of information transmitted in the mobile payment process are all the main secure problems. The secure mobile payment protocol is established base all the above secure problems’ solutions.

  • Secure UIM, Mobile, Payment, Protocol
  • References
  • [1]
    Enfo Desk (2015) 2015 Second Quarter China Mobile Payment Transaction Size Exceeded the Scale of the Internet Payment Transaction for the First Time.
    Luo, X. (2014) Basic Prin-ciple and Normal Regulation of PKI Technique Apply. Computer Knowledge and Technology.
    Wang ,Y.W., Zhao, Y.S. and Zhang, H. (2013) Research on the Countermeasures for the Security Issues of Mobile Terminals. De-signing Techniques of Posts and Telecommunications.
    Du, L.P., Guo, J.W. and Li, Y. (2013) Research on Mi-cro-Certificate Base Authentication Protocol. Computer Science and Electronics Engineering.
    Wang, H.X., Yang, D.L., Jiang, N. and Ma, H. (2013) An Online Mobile Payment Model with Simplified Terminal Authentication. Journal of Computer Research and Development.
    Feng, F.W., Li, Y., Du, L.P. and Zhao, G.F. (2013) Design of Digital Signature System Based on Combined Symmetric Key. Network Security Technology & Application.

Engineering Information Institute is the member of/source content provider to