Cryptanalysis of a secure and privacy preserving mobile wallet scheme with outsourced verification in cloud computing

D Tribedi, D Sadhukhan, S Ray - … , CICBA 2018, Kalyani, India, July 27–28 …, 2019 - Springer
Digital payment using mobile wallet is one of the easiest and frequent mode of payment
methods in recent era. Payment through mobile wallet is becoming more widespread due to …

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing

Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong… - Computer Standards & …, 2017 - Elsevier
Mobile wallet, also known as mobile payment, is becoming one of the most frequently used
approach to provide payment services under financial regulation via mobile device and may …

Analysis and improvement on a mobile payment protocol with outsourced verification in cloud service

B Kang, J Du, L Si, M Xie - Wuhan University Journal of Natural Sciences, 2019 - Springer
Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct
the payment via their mobile devices. To reduce the computation burden of …

Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement

Y Liao, Y He, F Li, S Zhou - Computer Standards & Interfaces, 2018 - Elsevier
Today, mobile payment is becoming one of the most frequently used approach to provide
payment services under business and financial organization via mobile devices, such as …

A secure mobile wallet framework with formal verification

SS Ahamad, VN Sastry, SK Udgata - International Journal of …, 2012 - igi-global.com
This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless
Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) a …

A survey on mobile payment request verification over cloud using key distribution

A Saranya, R Naresh - … on Recent Trends in Computer Science …, 2022 - ieeexplore.ieee.org
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …

Cloud based efficient authentication for mobile payments using key distribution method

A Saranya, R Naresh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The extensive usage of clever strategies fascinates numerous considerations on the
innovation intended for mobile payment method in the background of cloud computing …

Design of secure and efficient electronic payment system for mobile users

P Mohit, R Amin, GP Biswas - … , ICMC 2017, Haldia, India, January 17-21 …, 2017 - Springer
The recent advancement in smart phones and its widespread popularity switches the users
of traditional computing to mobile computing. In addition, to facilitate users, hand held …

Efficient mobile security for E health care application in cloud for secure payment using key distribution

A Saranya, R Naresh - Neural Processing Letters, 2023 - Springer
Through the growing attractiveness of the financial world, the e health care application has
developed quicker than the previous period, such that mobile payment adore extraordinary …

A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …