[1] |
Cao Yuzhi,Lu Yaobin,Gupta S,et al.The effects of differences between ecommerce and mcommerce on the consumers’ usage transfer from online to mobile channel [J].International Journal of Mobile Communications,2015,13(1):5170.
|
[2] |
Isaac J T,Zeadally S.Design,implementation,and performance analysis of a secure payment protocol in a payment gateway centric model [J].Computing,2014,96 (7):587611.
|
[3] |
Dahlberg T, Guo Jie, Ondrus J. A critical review of mobile payment research[J].Electronic Commerce Research and Applications,2015,14(5):265284.
|
[4] |
Lei Xinfeng,Song Shumin,Liu Weibing,et al.A survey on computationally sound formal analysis of cryptographic protocols[J].Chinese Journal of Computers,2014,37(5):9931016.(in Chinese)
|
[5] |
Dolev D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198208.
|
[6] |
Zhou Diancui,Qing Sihan,Zhou Zhanfei.A new tool for analyzing electronic commerce protocols [J].Journal of Software,2001,12(9):13181328.(in Chinese)
|
[7] |
Qing Sihan. A formal method for analyzing electronic commerce protocols [J].Journal of Software,2005,16(10):17571765.(in Chinese)
|
[8] |
Wang Caifen,Ge Jianhua.A new approach for the analysis of electronic commerce protocols [J].Chinese Journal of Computers,2004,27(4):507515.(in Chinese)
|
[9] |
Dong Rongsheng, Chen Dawei, Guo Yunchuan, et al.Finitestate analysis of a fair nonrepudiation protocol [J].Computer Science,2005,32(8):8386.(in Chinese)
|
[10] |
Guo Hua,Zhuang Lei,Zhang Xiyong,et al.Verifying multiple runs of FR protocol using model checking [J].Computer Science,2008,35(5):9598.(in Chinese)
|
[11] |
Guo Hua,Li Zhoujun,Zhuang Lei,et al.New approach for analyzing of ecommerce protocol [J].Computer Science,2010,8(1):5660.(in Chinese)
|
[12] |
Kremer S, Raskin J F.A gamebased verification of nonrepudiation and fair exchange protocols [J].Journal of Computer Security,2003,11(3):399429.
|
[13] |
Wen Jinghua, Zhang Mei, Li Xiang. Formal analysis of ecommerce protocols based on game [J].Journal on Communications,2006,27(3):7378.(in Chinese)
|
[14] |
Wen Jinghua, Li Xiang, Zhang Huanguo, et al.Formal analysis of fair ecommerce protocols based on ATL [J].Journal of Electronics & Information Technology,2007,29(4):901905.(in Chinese)
|
[15] |
Gan Zaobin, Xiao Shicheng, Li Kai, et al.Secure ecommerce payment protocol based on four parties [J].Computer Science,2011,38(10):3944.(in Chinese)
|
[16] |
Xiao Shicheng,Li Kai,Gan Zaobin.Analysis and verification of secure ecommerce payment protocol based on four parties [J].Computer Science,2012,39(3):7578.(in Chinese)
|
[17] |
Isaac J T,Zeadally S.An anonymous secure payment protocol in a payment gateway centric model [J].Procedia Computer Science,2012,10:758765.
|
[18] |
Alur R,Dill D L.A theory of timed automata [J].Theoretical Computer Science,1994,126(2):183235.
|
[19] |
Larsen K G,Petterson P,Wang Yi.UPPAAL in a nutshell[J].International Journal on Software Tools for Technology Transfer,1997,1(12):134152.
|
[20] |
Behrmann G, David A, Larsen K G.A tutorial on Uppaal[M].Berlin Heidelberg:Springer,2004:200236.
|
|
附中文参考文献:
|
[4] |
雷新峰,宋书民,刘伟兵,等.计算可靠的密码协议形式化分析综述[J].计算机学报,2014,37(5):9931016.
|
[6] |
周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):13181328.
|
[7] |
卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):17571765.
|
[8] |
王彩芬,葛建华.一种分析电子商务协议的新方法[J].计算机学报,2004,27(4):507515.
|
[9] |
董荣胜,陈大伟,郭云川,等.公平非否认协议的有限状态分析[J].计算机科学,2005,32(8):8386.
|
[10] |
郭华,庄雷,张习勇,等.基于模型检测的多轮FR协议验证[J].计算机科学,2008,35(5):9598.
|
[11] |
郭华,李舟军,庄雷,等.一种新的电子商务协议分析方法[J].计算机科学,2010,8(1):5660.
|
[13] |
文静华,张梅,李祥.基于博弈的电子商务协议分析[J].通信学报,2006,27(3):7378.
|
[14] |
文静华,李祥,张焕国,等.基于ATL的公平电子商务协议形式化分析[J].电子与信息学报,2007,29(4):901905.
|
[15] |
甘早斌,肖仕成,李开,等.基于四方的安全电子商务支付协议研究[J].计算机科学,2011,38(10):3944.
|
[16] |
肖仕成,李开,甘早斌.基于四方的安全电子商务支付协议分析与验证[J].计算机科学,2012,39(3):7578.
|