[1]
Enfo Desk (2015) 2015 Second Quarter China Mobile Payment Transaction Size Exceeded the Scale of the Internet Payment Transaction for the First Time.
http://mt.sohu.com/20151014/n423220903.shtml
[2]
Luo, X. (2014) Basic Prin-ciple and Normal Regulation of PKI Technique Apply. Computer Knowledge and Technology.
[3]
Wang ,Y.W., Zhao, Y.S. and Zhang, H. (2013) Research on the Countermeasures for the Security Issues of Mobile Terminals. De-signing Techniques of Posts and Telecommunications.
[4]
Du, L.P., Guo, J.W. and Li, Y. (2013) Research on Mi-cro-Certificate Base Authentication Protocol. Computer Science and Electronics Engineering.
[5]
Wang, H.X., Yang, D.L., Jiang, N. and Ma, H. (2013) An Online Mobile Payment Model with Simplified Terminal Authentication. Journal of Computer Research and Development.
[6]
Feng, F.W., Li, Y., Du, L.P. and Zhao, G.F. (2013) Design of Digital Signature System Based on Combined Symmetric Key. Network Security Technology & Application.