[1] 中国互联网络信息中心.第37次中国互联网络发展状况统计报告报告[R]. 北京:中国互联网络信息中心,2016. (China Internet Network Information Center. The 37th China Internet Development Statistics Report[R]. Beijing:CNNIC, 2016.) [2] 李海飞.移动支付中的安全协议研究[D].西安:西安电子科技大学,2014:7-13. (LI H F. Research on security protocol in mobile payment[D]. Xi'an:Xidian University, 2014:7-13.) [3] DAHLBERG T, GUO J, ONDRUS J. A critical review of mobile payment research[J]. Journal of Electronic Commerce Research and Applications, 2015, 14(5):265-284. [4] 杨晨,杨建军.移动支付安全保障技术体系研究[J].信息技术与标准化,2010(7):17-20. (YANG C, YANG J J. Research on the technical system and standardization of security assurance for mobile payment[J]. Information Technology & Standardization, 2010(7):17-20.) [5] XU Z, ZHANG T, ZENG Y, et al. A secure mobile payment framework based on face authentication[C]//IMECS2015:Proceedings of the 2015 International MultiConference of Engineers and Computer Scientists, LNCS 2215. Berlin:Springer-Verlag, 2015, 1:495-501. [6] 白璐.信息技术对我国商业银行创新的影响研究[D].长春:吉林大学,2013:13-17. (BAI L. Research on the influence of information technology on the innovation of China's commercial banks[D]. Changchun:Jilin University, 2013:13-17.) [7] 周晓谊,姚孝明,李益红.互联网金融存在的安全问题亟待解决——以移动远程支付APP为例[J].信息安全与技术,2014,5(10):8-12. (ZHOU X Y, YAO X M, LI Y H. Security problems of Internet finance urge solutions-an example of remote payment APPs on mobile devices[J]. Information Security and Technology, 2014, 5(10):8-12.) [8] 冯韵.移动支付中身份认证分析与研究[J].信息通信,2012(3):107-109. (FENG Y. Analysis and research of identity authentication in mobile payment[J]. Journal of Information Communication,2012(3):107-109.) [9] 曹巍,赵滟.一种基于双因素认证的移动支付安全技术研究[J].信息安全与技术,2014,5(2):10-12,15. (CAO W, ZHAO Y. Research on the technology of mobile payment security based on two-factor authentication[J]. Information Security and Technology,2014, 5(2):10-12,15.) [10] WARD H, GREENWALD G E, SHANAHAN F A. Systems and methods for remote authorization of financial transactions using Public Key Infrastructure (PKI):US, 9462473[P]. 2016-10-04. [11] 张裔智,赵毅,汤小斌.MD5算法研究[J].计算机科学,2008,35(7):295-297. (ZHANG Y Z, ZHAO Y, TANG X B. Research on MD5 algorithm[J]. Computer Science, 2008, 35(7):295-297.) [12] DAEMEN J, RIJMEN V.高级加密标准(AES)算法:Rijndael的设计[M].谷大武,徐胜波,译.北京:清华大学出版社,2003:9-52. (DAEMEN J, RIJMEN V. The Design of Rijndael AES:The Advanced Encryption Standard[M].GU D W,XU S B, translated. Beijing:Tsinghua University Press, 2003:9-52.) [13] 王茜,倪建伟.一种基于RSA的加密算法[J].重庆大学学报(自然科学版),2005,28(1):68-72. (WANG Q, NI J W. An RSA based encryption algorithm[J]. Journal of Chongqing University (Natural Science Edition), 2005, 28(1):68-72.) [14] 周晓斌,许勇,张凌.一种开放式PKI身份认证模型的研究[J].国防科技大学学报,2013,35(1):169-174. (ZHOU X B, XU Y, ZHANG L. Research on an open PKI identity authentication model[J]. Journal of National University of Defense Technology, 2013, 35(1):169-174.) [15] 肖振久,胡驰,姜正涛,等.AES与RSA算法优化及其混合加密体制[J].计算机应用研究,2014,31(4):1189-1194. (XIAO Z J,HU C,JIANG Z T et al. AES and RSA algorithm optimization and its hybrid encryption system[J]. Application Research of Computers, 2014, 31(4):1189-1194.) |