2021
DOI: 10.1007/s11227-021-03830-4
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-based mobile payment system using identity-based signature providing key revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…For example, Liu et al (2020) propose a secure mobile payment framework that integrates public key cryptography. Similarly, Alidadi Shamsabadi and Bakhtiari (2022) suggest utilizing an identity-based signature providing key revocation that adds an extra layer of protection. Wang et al (2021) propose machine learning as a robust evaluation system for mobile payment security, demonstrating the power of predictive analytics in mitigating fraudulent activities in real-time.…”
Section: Problems Outlined In Current Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Liu et al (2020) propose a secure mobile payment framework that integrates public key cryptography. Similarly, Alidadi Shamsabadi and Bakhtiari (2022) suggest utilizing an identity-based signature providing key revocation that adds an extra layer of protection. Wang et al (2021) propose machine learning as a robust evaluation system for mobile payment security, demonstrating the power of predictive analytics in mitigating fraudulent activities in real-time.…”
Section: Problems Outlined In Current Researchmentioning
confidence: 99%
“…By predicting potential vulnerabilities and future threats, Big Data enables preemptive security measures that enhance the overall security framework (Hwang et al, 2021;Tran, 2020). Amongst other findings, a pertinent one is that while Big Data analytics substantially improve mobile payment security, careful navigation around privacy and data protection is imperative (Vincent et al, 2020;Alidadi Shamsabadi & Bakhtiari Chehelcheshmeh, 2022). The balance between exploiting data for security purposes and ensuring user privacy is delicate, and misuse carries severe implications both for user trust and legal conformity.…”
Section: Insightsmentioning
confidence: 99%
“…Researchers from home and abroad have given the definition of mobile payment, which is as follows: a mobile payment is a form of payment transaction processing over mobile communication techniques in which the payer initializes, authenticates, and completes payment by mobile devices [31]. Thus far, there have been some different proposed mobile payment protocols, such as [32,33]. These protocols are based on symmetric cryptography.…”
Section: Related Workmentioning
confidence: 99%