JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 56-61.doi: 10.6040/j.issn.1671-9352.2.2014.345
Previous Articles Next Articles
YUAN Bian-qing, LIU Ji-qiang
CLC Number:
[1] DICKINGER A, KLEIJNEN M. Coupons going wireless: determinants of consumer intentions to redeem mobile coupons[J]. Journal of Interactive Marketing, 2008, 22(3):23-39. [2] COSKUN V, OZDENIZCI B, OK K. A survey on near field communication (NFC) technology[J]. Wireless Personal Communications, 2013, 71(3): 2259-2294. [3] DOMINIKUS S, AIGNER M. mCoupons: an application for near field communication (NFC)[C]//Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops(AINAW '07). Washington: IEEE Computer Society, 2007:421-428. [4] AIGNER M, DOMINIKUS S, FELDHOFER M. A system of secure virtual coupons using NFC technology[C]//Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.Washington: IEEE Computer Society, 2007: 362-366. [5] HSIANG H C, KUO H C, SHIH W K. A secure mCoupon scheme using near field communication[J]. International Journal of Innovative Computing, Information and Control, 2009, 5(11): 3901-3909. [6] PARK S W, LEE I Y. Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC[J]. International Journal of Security and Its Applications, 2013, 7(5): 131-138. [7] ALSHEHRI A, BRIFFA J A, SCHNEIDER S, et al. Formal security analysis of NFC M-coupon protocols using Casper/FDR[C]//Proceedings of the 5th International Workshop on Near Field Communication. Washington: IEEE Computer Society, 2013: 1-6. [8] SHOJIMA T, IKKAI Y, KOMODA N. A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system[C]//Proceedings of 2004 IEEE International Conference on Systems, Man and Cybernetics. Washington: IEEE Computer Society, 2004: 1086-1091. [9] SHOJIMA T, IKKAI Y, KOMODA N, et al. An incentive attached peer to peer electronic coupon system[J]. Studies in Informatics and Control, 2004, 13(4): 233-242. [10] CHANG Chin-chen, WU Chia-chi, LIN Luon-chang. A secure e-coupon system for mobile users[J]. International Journal of Computer Science and Network Security, 2006, 6(1): 273-279. [11] HSUEH Sue-Chen, CHEN Junming. Sharing secure m-coupons for peer-generated targeting via eWOM communications[J]. Electronic Commerce Research and Applications, 2010, 9(4): 283-293. [12] HESS F. Efficient identity based signature schemes based on pairings[M]//Selected Areas in Cryptography. Berlin-Heidelberg: Springer, 2003: 310-324. |
[1] | XIE Shu-cui, SHAO Ai-xia, ZHANG Jian-zhong. A quantum multi-proxy blind signature scheme based on cluster state [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 105-110. |
[2] | WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 . |
[3] | LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 . |
|