2017
DOI: 10.1016/j.csi.2016.11.012
|View full text |Cite
|
Sign up to set email alerts
|

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
32
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 45 publications
(33 citation statements)
references
References 31 publications
1
32
0
Order By: Relevance
“…24,26 By means of formal verification, we can authorize the functional specifications of distributed systems. 38,39 Also we can prove the conceptual interactions between behavioral modeling system and web services for existing communication systems. [40][41][42] Checking correctness of the service composition is 1 of the fundamental advantages of formal verification.…”
Section: Introductionmentioning
confidence: 95%
See 1 more Smart Citation
“…24,26 By means of formal verification, we can authorize the functional specifications of distributed systems. 38,39 Also we can prove the conceptual interactions between behavioral modeling system and web services for existing communication systems. [40][41][42] Checking correctness of the service composition is 1 of the fundamental advantages of formal verification.…”
Section: Introductionmentioning
confidence: 95%
“…In other hand, formal verification method is an essential issue in the complex communication systems development such as cloud computing, SDN, WSN, and IoT . By means of formal verification, we can authorize the functional specifications of distributed systems . Also we can prove the conceptual interactions between behavioral modeling system and web services for existing communication systems …”
Section: Introductionmentioning
confidence: 99%
“…As we know, since mobile devices are generally energy-intensive and computingpower-limited, complex algorithms and protocols are not suitable for them. Considering hash function with the features of low power consumption and being one way and collision-free [11], a trusted hash chain is constructed in our model.…”
Section: Cryptographic Primitivesmentioning
confidence: 99%
“…Abughazalah et al [10] presented a mobile payment scheme based on one-time passwords and tamper-resistant keys. Qin et al [11] provided a novel approach to secure a mobile wallet by incorporating digital signature and pseudoidentity techniques. But the payment platform in the schemes [10,11] knows the relationship between the pseudonym and the real identity of a user.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation