Skip to main content
Log in

Systematic survey of mobile payments, protocols, and security infrastructure

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and online shopping, among other applications. Mobile payments are playing a vital role in the fast growth of online markets and are revolutionizing the supply chain of businesses and industries. Mobile payments are becoming dominant compared to conventional off-line mode payment channels and online e-channels such as ATM, e-cheque, and e-card payments. The success of e-business depends on several factors, including the type of mobile payment channel used, the associated security infrastructure, the stakeholders involved, and the m-business models adopted. In this paper, we present a systematic literature review (SLR) of mobile payments and characterize the state-of-the-art research conducted in this area, covering articles published during the past two decades, from 2000 to 2020. Following the SLR process, we examined over 350 research papers with a comprehensive and detailed inspection of the mobile payment domain’s literature. Based on the analysis, we present the trends, patterns, new technologies, innovations, gaps in the existing literature, and critical challenges. The recommendations given will help identify the primary areas requiring advancement in future research on mobile payment systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Notes

  1. https://www.statista.com/statistics/279957/number-of-mobile-payment-users-by-region/.

  2. https://www.statista.com/statistics/244381/global-mobile-payments-market-share-forecast-by-usage/.

References

  • Abedi L, Nematbakhsh M, Abdolmaleki A (2012) A model for context aware mobile payment. J Theor Appl Electron Commer Res 7(3):1–10

    Article  Google Scholar 

  • Aboud SJ (2014) Analysis of offline E-cash schemes. Int J Adv Res 2(8):406–410

    Google Scholar 

  • Abughazalah S, Markantonakis K, Mayes K (2014) Secure mobile payment on NFC-enabled mobile phones formally analysed using CasperFDR. IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp 422–431, 24–26 Sept 2014, Beijing, China

  • Adesuyi FA, Oluwafemi O, Oludare AI, Victor AN, Rick AV (2013) Secure authentication for mobile banking using facial recognition. IOSR-JCE J Comput Eng 10(3):51–59

    Article  Google Scholar 

  • Agarwal S, Khapra M, Menezes B. Uchat N (2007) Security issues in mobile payment systems. In: Proceedings of the 5th International Conference on E-Governance (ICEG’2007), pp 142–152, 28–30 Dec 2007, Hyderabad, India

  • Aghili SF, Mala H (2019) Security analysis of an ultra–lightweight RFID authentication protocol for m–commerce. Int J Commun Syst 32(3):e3837

  • Agoyi M, Seral D (2010) SMS security: an asymmetric encryption approach. IEEE 6th International Conference on Wireless and Mobile Communications (ICWMC’2010), pp 448–452, 20–25 Sept 2010, Valencia, Spain

  • Ahamad SS, Sastry VN, Udgata SK (2012) A secure mobile wallet framework with formal verification. Int J Adv Pervasive Ubiquitous Comput (IJAPUC) IGI Global 4(2):1–15

    Article  Google Scholar 

  • Ahamad SS, Sastry VN, Udgata SK (2012a) Enhanced mobile SET protocol with formal verification. Third International Conference on Computer and Communication Technology (ICCCT), pp 288–293, 23–25 Nov 2012, Allahabad, India

  • Ahamad SS, Udgata SK, Sastry VN (2012b) A new mobile payment system with formal verification. Int J Internet Technol Secur Trans (IJITST) 4(1):71–103

    Article  Google Scholar 

  • Ahamad SS, Sastry VN, Nair M (2013) A biometric based secure mobile payment framework. 4th International Conference on Computer and Communication Technology (ICCCT), pp 239–246, 20–22 Sept 2013, Allahabad, India

  • Ahamad SS, Sastry VN, Udgata SK (2014) Secure mobile payment framework based on UICC with formal verification. Int J Comput Scie Eng (IJCSE), Inderscience Publishers Ltd, 9(4):355–370

  • Ahamad SS, Al-Shourbaji I, Al-Janabi S (2016) A secure NFC mobile payment protocol based on biometrics with formal verification. Int J Internet Technol Secur Trans (IJITST) 6(2):103–132

    Article  Google Scholar 

  • Ahamad SS, Sastry VN, Udgata SK (2017) A secure and optimized proximity mobile payment framework with formal verification. In: Mobile commerce: concepts, methodologies, tools, and applications, vol 6, pp 161–189

  • Ahamad SS, Pathan AK (2019) Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adapt Syst Model (Springer) 7(1):1–18

    Google Scholar 

  • Ahmed R, Dharaskar RV (2009) Mobile forensics: an introduction from Indian law enforcement perspective. International Conference on Information Systems, Technology and Management (ICISTM’2009), CCIS (Springer), Vol. 31, pp 173–184, 12–13 Mar 2009, Ghaziabad, India

  • Akter S, Chellappan S, Chakraborty T, Khan TA, Rahman A, Al I, Alim ABM (2020) Man-in-the-middle attack on contactless payment over NFC communications: design. Implementation, Experiments and Detection, IEEE Transactions on Dependable and Secure Computing

  • Albasheer MO, Bashier EBM (2013) Enhanced model for PKI certificate validation in the mobile banking. International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp 470–476, 26–28 Aug 2013, Khartoum, Sudan

  • Alexiou N, Basagiannis S, Petridou S (2014) Security analysis of NFC relay attacks using probabilistic model checking. Int Wirel Commun Mobile Comput Conf (IWCMC), pp 524–529, 4–8 Aug 2014, Nicosia, Cyprus

  • Alexiou N, Basagiannis S, Petridou S (2016) Formal security analysis of near field communication using model checking. Comput Secur (Elsevier) 60:1–14

    Article  Google Scholar 

  • Alharbi MH, Alhazmi OH (2019) Prototype: User authentication scheme for IoT using NFC. International Conference on Computer and Information Sciences (ICCIS), pp 1–5, 3–4 April 2019, Sakaka, Saudi Arabia

  • Aliero MS, Ghani I, Qureshi KN, Rohani MF (2020) An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Hum Comput (JIHC) 11(1):249–266

    Article  Google Scholar 

  • Aljohani A (2014) Mobile payments with instant settlements. Eighth International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST’2014), pp 181–185, 10–12 Sept 2014, Oxford, UK

  • Alimi V, Pasquet M (2009) Post-distribution provisioning and personalization of a payment application on a UICC-based Secure Element. International Conference on Availability, Reliability and Security (ARES’2009), pp 701–705, 16–19 March 2009, Fukuoka, Japan

  • Almuairfi S, Veeraraghavan P, Chilamkurti N, Doo-Soon P (2014) Anonymous proximity mobile payment (APMP). Peer-to-Peer Net Appl (Springer) 7(4):620–627

    Article  Google Scholar 

  • Alqahtani M (2015) A framework of mobile transaction use: the user’s perspective. Dissertation, University of East Anglia

  • Alshehri A, Briffa JA, Schneider S, Wesemeyer S (2013) Formal security analysis of NFC M-coupon protocols using Casper/FDR. 5th International Workshop on Near Field Communication (NFC), pp 1–6, 2013, Zurich, Switzerland

  • Anand RS, Madhavan CEV (2000) An online, transferable E-Cash payment system. International Conference on Cryptology in India (INDOCRYPT 2000), pp 93–103, Calcutta, India

  • Antovski L, Gusev M (2003) M-payments. Proceedings of the 25th International Conference on Information Technology Interfaces (ITI’2003), pp 95–100

  • Anuar NB, Kuen LN, Zakaria O, Gani A, Wahab AWA (2008) GSM mobile SMS/MMS using public key infrastructure: m-PKI. WSEAS Trans Comput 7(8):1219–1229

    Google Scholar 

  • Apanasevic T, Markendahl J, Arvidsson N (2016) Stakeholders’ expectations of mobile payment in retail: lessons from Sweden. Int J Bank Market 34(1): 37–61

  • Ashok A, Gajera S, Chakraborty J, Arolker P, Rai N (2012) M-wallet: an SMS based payment system. Int J Eng Res Appl(IJERA), ISSN: 2248–9622

  • Askoxylakis IG, Pramateftakis M, Kastanis DD, Traganitis AP (2007) Integration of a secure mobile payment system in a GSM/UMTS SIM smart card. In: Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS’07), pp 40–50

  • Au YA, Kauffman RJ (2008) The economics of mobile payments: understanding stakeholder issues for an emerging financial technology application. Electron Commer Res Appl (ECRA, Elsevier) 7(2):141–164

    Article  Google Scholar 

  • Augsburg C, Hedman J (2014) Value added services and adoption of mobile payments. In: Proceedings of the sixteenth international conference on electronic commerce (ICEC’14), Philadelphia, PA, USA, pp 27–32

  • Aziza H (2010) NFC technology in mobile phone next-generation services. Second International Workshop on Near Field Communication, pp 21–26, Monaco, Monaco

  • Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: A new anonymous mobile payment system implemented by elliptic curve cryptography. In: Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering (CSIE’09), Vol.3, pp 286–290

  • Balan R.K, Ramasubbu N, Prakobphol K, Christin N, Hong J (2009) mFerio: the design and evaluation of a peer-to-peer mobile payment system. In: ACM Proceedings of the 7th International Conference on Mobile Systems, Applications and Services (MobiSys’09), pp 291–304, https://doi.org/10.1145/1555816.1555846

  • Bamasak O (2011) Exploring consumers acceptance of mobile payments–an empirical study. Int J Inf Technol Commun Converg (IJITCC), 1(2), pp 173–185

  • Bangdao C, Roscoe AW (2011) Mobile electronic identity: securing payment on mobile phones. In: IFIP International Workshop on Information Security Theory and Practices (WISTP’2011), pp 22–37, 30 June–2 (July 2014) Heraklion. Crete, Greece

  • Baseri Y, Takhtaei B, Mohajeri J (2013) Secure untraceable off-line electronic cash system. Scientia Iranica (Elsevier), 20(3), pp 637–646, https://doi.org/10.1016/j.scient.2013.05.002

  • Binga P, Caia FU, Xiongb FU (2008) Efficient mobile payment system based on ECC [J]. Application Research of Computers, Vol.9

  • Bojjagani S, Sastry VN (2017) A secure end-to-end SMS-based mobile banking protocol. Int J Commun Syst (IJCS) Wiley 30(15): https://doi.org/10.1002/dac.3302

    Article  Google Scholar 

  • Bojjagani S, Sastry VN (2019) A secure end-to-end proximity NFC-based mobile payment protocol. Computer Standards & Interfaces (CSI) Elsevier, Vol.66, pp 103348, https://doi.org/10.1016/j.csi.2019.04.007

  • Bojjagani S, Brabin DRD, Rao PVV (2020) PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification. Proc Comput Sci (Elsevier) 171:1110–1119

    Article  Google Scholar 

  • Bojjagani S, Reddy BR, Sandhya M, Vemula DR (2020a) CybSecMLC: A Comparative Analysis on Cyber Security Intrusion Detection Using Machine Learning Classifiers. Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA’2020), pp 232–245, 14–17 Oct 2020, Chennai, India

  • Bojjagani S, Sastry VN (2015a) Stamba: Security testing for Android mobile banking apps. In: Proceedings of the second international symposium on signal processing and intelligent recognition systems (SIRS’15), Trivandrum, India, pp. 671–683. https://doi.org/10.1007/978-3-319-28658-7_57

  • Bojjagani S, Sastry VN (2015b) SSMBP: A secure SMS-based mobile banking protocol with formal verification. In: IEEE 11th international conference on wireless and mobile computing, networking and communications (WiMob), Abu Dhabi, UAE, pp 252–259. https://doi.org/10.1109/WiMOB.2015.7347969

  • Bojjagani S, Sastry VN (2017) VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps. In: IEEE 3rd international conference on collaboration and internet computing (CIC), San Jose. California, USA, pp 77–86. https://doi.org/10.1109/CIC.2017.00022

  • Borzekowski R, Elizabeth KK, Shaista A (2008) Consumers’ use of debit cards: patterns, preferences, and price response. Journal of money, credit and banking (Wiley Online Library), 40(1):149–172

  • Bouazzouni MA, Conchon E, Peyrard F (2018) Trusted mobile computing: an overview of existing solutions. Fut Gen Comput Syst (Elsevier) 80:596–612

    Article  Google Scholar 

  • Bravo J, Hervás R, Gallego R, Casero G, Vergara M, Carmona T, Fuentes C, Nava SW, Chavira G, Villarreal V (2008) Enabling NFC technology to support activities in an Alzheimer’s day center. In: ACM Proceedings of the 1st International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’08), pp 1–5, 16–18 July 2008, Athens, Greece

  • Brereton P, Kitchenham BA, Budgen D, Turner M, Khalil M (2007) Lessons from applying the systematic literature review process within the software engineering domain. J Syst Softw (Elsevier) 80(4):571–583

    Article  Google Scholar 

  • Brlek S, Hamadou S, Mullins J (2006) A flaw in the electronic commerce protocol SET. Inf Process Lett (Elsevier) 97(3):104–108

    Article  MathSciNet  MATH  Google Scholar 

  • Bujang SDA, Selamat A (2009) Verification of mobile SMS application with model checking agent. International Conference on Information and Multimedia Technology (ICIMT’2009), pp 361–365, 16–18 Dec 2009, Jeju, Korea (South)

  • Cappiello I, Puglia S, Vitaletti A (2009) Design and initial evaluation of a ubiquitous touch-based remote grocery shopping process. IEEE First International Workshop on Near Field Communication (NFC’09), pp 9–14, 24–24 Feb 2009, Hagenberg, Austria

  • Carr M (2007) Mobile payment systems and services: an introduction. Mobile Payment Forum 1(12):1–12

    Google Scholar 

  • Carton F, Hedman J, Dennehy D, Damsgaard J, Tan KT, McCarthy JB (2012) Developing a framework for mobile payments integration. Electron J Inf Syst Eval 15(1):14–25

    Google Scholar 

  • Chaix L, Torre D (2011) Four models for mobile payments. University Nice Sophia-Antipolis, JEL Classification E 42:1–25

  • Chang YS, Chang CL, Hung YS, Tsai CT (2010) NCASH: NFC phone-enabled personalized context awareness smart-home environment. An International Journal Cybernetics and System, (Taylor & Francis) 41(2), pp 123–145

  • Chavira G, Nava SW, Hervás R, Villarreal V, Bravo J, Martín S, Castro M (2008) Services through NFC technology in AmI Environment. In: ACM Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services (iiWAS’2008), pp 666-669, 24-26 November 2008, Linz, Austria

  • Chen JJ, Adams C (2004) Short-range wireless technologies with mobile payments systems. In: ACM proceedings of the 6th international conference on electronic commerce (ICEC’04), pp 649–656

  • Lei-da C (2008) A model of consumer acceptance of mobile payment. Int J Mobile Commun (Inderscience Publishers) 6(1):32–52

    Article  Google Scholar 

  • Chen Y, Chou J-S, Sun H-M, Cho M-H (2011) A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron Commerce Res Appl 10(6):673–682

    Article  Google Scholar 

  • Chen Y, Chou J-S (2014) Cryptanalysis on “Secure untraceable off-line electronic cash system.” IACR Cryptol. ePrint Arch 2014:63

  • Chen Y, Chou J-S (2015) On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking.” IJ Network Security 17(6):708–711

  • Chen Y, Xu W, Li Peng, Zhang H (2019) Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT. IEEE Access 7:15210–15221

    Article  Google Scholar 

  • Cheng HC, Liao WW, Chi TY, Wei SY (2011) A secure and practical key management mechanism for nfc read-write mode. In: 13th IEEE International Conference On Advanced Communication Technology (ICACT), pp 1095-1011, 13-16 Feb 2011, Gangwon-Do, Korea (South)

  • Cheng Y, Huang TY (2013) High speed rail passengers’ mobile ticketing adoption. Transport Res Part C Emerg Technol 30:143–160

    Article  Google Scholar 

  • Cheong CP (2010) A simple and secure credit card-based payment system. Electron Serv Concepts Methodol Tools Appl (IGI Global), pp 834–842

    Google Scholar 

  • Chin AG, Harris MA, Brookshire R (2020) An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework. Information Systems Frontiers (Springer) 1–19

  • Ching, YC, Kreft H (2008) Faircash: Concepts and framework. In: IEEE Second International Conference On Next Generation Mobile Applications, Services and Technologies, (NGMAST’08), pp 269–274, 16–19 (September 2008) Washington. DC, USA

  • Chong MK (2006) Security of mobile banking: Secure SMS banking. Dissertation, University of Cape Town, South Africa

  • Chow YW, Susilo W, Yang G, Au MH, Wang C (2016) Authentication and transaction verification using qr codes with a mobile device. In: Proceedings of the 9th International Conference On Security, Privacy, and Anonymity in Computation, Communication, and Storage, (SpaCCS’2016), pp 437-451, 16-18 November 2016, Zhangjiajie, China

  • Clarke R (2008) A risk assessment framework for mobile payments. Bled 2008 Proceedings, http://www.rogerclarke.com/EC/MP-RAF.html/mobile.org/mobile.org/fileadmin/Papers/MP/Conditions-for-acceptance-and-usage-of-mobile-payment-procedures_10-07.pdf (Accessed 26 Aug 2020)

  • Conde-Lagoa D, Costa-Montenegro E, González-Castaño, Francisco J, Gil-Castiñeira F (2010) Secure eTickets Based on QR-Codes with User-Encrypted Content. In: IEEE International Conference On Consumer Electronics (ICCE’2010), 11-13 Jan 2010, pp 257-258

  • Čović Z, Viktor Ü, Simon J, Dobrilović D, Stojanov Ž (2016) Usage of QR codes in web based system for the electronic market research. IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY’2016), pp 187-192

  • Dahlberg T, Mallat N, Öörni A (2003) Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions: Tentative evidence. Stockholm Mobil Roundtable 22:23

    Google Scholar 

  • Dahlberg T, Huurros M, Ainamo A (2008) Lost Opportunity Why Has Dominant Design Failed to Emerge for the Mobile Payment Services Market in Finland?. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, (HICSS’2008), pp. 83–83, 07–10 (January 2008) Waikoloa. HI, USA

  • Dahlberg T, Mallat N, Ondrus J, Zmijewska A (2008a) Past, present and future of mobile payments research: a literature review. Electron Commer Res Appl (Elsevier) 7(2):165–181

    Article  Google Scholar 

  • Dahlberg T, Guo J, Ondrus J (2015) A critical review of mobile payment research. Electron Commer Res Appl 14(5):265–284

    Article  Google Scholar 

  • Dai X, Ayoade O, Grundy J (2006) Off-line micro-payment protocol for multiple vendors in mobile commerce. In: Seventh IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’06), pp 197-202, 4-7 December 2006, Taipei, Taiwan

  • Dai W, Zhou S, Luo G, Chen Z, Xie L (2011) Analyze on mobile payment based on RFID. Proc Environ Sci (Elsevier) 10:950–955

    Article  Google Scholar 

  • Dai W, Cai X, Wu H, Zhao W, Li X (2011a) An integrated mobile phone payment system based on 3g network. J Netw 6(9):1329–1336

    Article  Google Scholar 

  • Damsgaard J, Gao P (2004) A framework for analyzing mobile telecommunications market development. Mobile Inf Syst 169–182

  • Das ML, Saxena A, Gulati VP (2005) A security framework for mobile-to-mobile payment network. In: IEEE International Conference on Personal Wireless Communications (ICPWC’2005), pp 420-423, 23-25 January 2005, New Delhi, India

  • Daştan İ, Gürler C (2016) Factors affecting the adoption of mobile payment systems: An empirical analysis. EMAJ: Emerg Markets J 6(1):17–24

  • Daza V, Di PR, Lombardi F, Signorini M (2014) FORCE: Fully off-line secure credits for mobile micro payments. 11th International Conference on Security and Cryptography (SECRYPT), pp 1-12

  • Daza V, Di PR, Lombardi F, Signorini M (2015) FRoDO: Fraud resilient device for off-line micro-payments. IEEE Transactions on Dependable and Secure Computing 13(2):296–311

    Article  Google Scholar 

  • De Reuver M, Verschuur E, Nikayin F, Cerpa N, Bouwman H (2015) Collective action for mobile payment platforms: A case study on collaboration issues between banks and telecom operators. Electron Commer Res Appl 14(5):331–344

    Article  Google Scholar 

  • De Santis A, Castiglione A, Cattaneo G, Cembalo M, Petagna F, Petrillo UF (2010) An extensible framework for efficient secure SMS., IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS’2010), pp 843-850

  • Dennehy D, Sammon D (2015) Trends in mobile payments research: a literature review. J Innov Manag 3(1):49–61

    Article  Google Scholar 

  • Di Pietro R, Me G, Strangio MA (2005) A two-factor mobile authentication scheme for secure financial transactions. In: IEEE International Conference on Mobile Business (ICMB’05), pp 28-34, 11-13 July 2005, Sydney, Australia

  • Dominikus S, Aigner M (2007) mCoupons: An application for near field communication (NFC). In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Vol.2, pp 421-428, 21-23 May 2007, Niagara Falls, Canada

  • Duangphasuk S, Warasart M, Kungpisdan S (2011) Design and accountability analysis of a secure SMS-based mobile payment protocol. In:The 8th Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand-Conference, pp 442-445

  • Dwivedi R, Dey S, Sharma MA, Goel A (2020) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Hum Comput (Springer) 11:1495–1509

    Article  Google Scholar 

  • Eisenmann TR, Parker G, Van Alstyne M (2009) Opening platforms: how, when and why? Platforms, markets and innovation 6:131–162

    Google Scholar 

  • Elkhodr M, Shahrestani S, Kourouche K (2012) A proposal to improve the security of mobile banking applications. 10th IEEE International Conference on ICT and Knowledge Engineering, pp 260-265, 21-23 Nov 2012, Bangkok, Thailand

  • Ertaul L, Lu W (2005) ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). International Conference on Research in Networking 102–113

  • Eslami Z, Talebi M (2011) A new untraceable off-line electronic cash system. Electron Commer Res Appl 10(1):59–66

    Article  Google Scholar 

  • Esmaeili L, Borhani-Fard Z, Arasteh MA (2012) A survey on mobile payment systems security. Research Journal of Applied Sciences, Engineering and Technology 4(20):4043–4050

    Google Scholar 

  • Fan CI, Sun WZ, Hau HT (2014) Date attachable offline electronic cash scheme. The Scientific World Journal (Hindawi), Vol. 2014, Article ID 216973, pp 1-19, https://doi.org/10.1155/2014/216973

  • Fan Y, Liu S, Tan G, Qiao F (2018) Fine-grained access control based on trusted execution environment. Future Generation Computer Systems (Elsevier), Vol.109, pp 551-561, https://doi.org/10.1016/j.future.2018.05.062

  • Ferreira MC, Nóvoa H, Dias TG et al (2014) A proposal for a public transport ticketing solution based on customers’ mobile devices. Procedia-Social and Behavioral Sciences 111:232–241

    Article  Google Scholar 

  • Firoz MH, Ahmed Z (2017) Defensive protocol to ensure safe Mobile Financial Transaction in current context. In: IEEE Third Asian Conference on Defence Technology (ACDT), pp 54-58, 18-20 Jan 2017, Phuket, Thailand

  • Fong S, Lai E (2005) Mobile mini-payment scheme using SMS-credit. International Conference on Computational Science and Its Applications (ICCSA’2005), pp 1106-1114, https://doi.org/10.1007/11424826_118

  • Fourati A, Ayed HB, Kamoun F, Benzekri A (2002) A set based approach to secure the payment in mobile commerce. In: Proceedings LCN?: 27th Annual IEEE Conference on Local Computer Networks, pp 136–137, 6–8, (Nov 2002) Tampa. Florida, USA

  • Francis L, Hancke G, Mayes K, Markantonakis K (2010) Practical NFC peer-to-peer relay attack using mobile phones. In: Springer Proceedings of International Workshop On. Radio Frequency Identification: Security and Privacy Issues (RFIDSec’2010), pp 35-49, 8-9 Jun 2010, Istanbul, Turkey

  • Francisco LC, Francisco ML, Juan SF (2015) Payment systems in new electronic environments: consumer behavior in payment systems via SMS. International Journal of Information Technology & Decision Making 14(02):421–449

    Article  Google Scholar 

  • Fressancourt A, Hérault C, Ptak E (2009) NFCSocial: Social networking in mobility through IMS and NFC. In. IEEE International Workshop on Near Field Communication (NFC’09), pp 24-29, 24-24 Feb 2009, Hagenberg, Austria

  • Frimpong K, Al-Shuridah O, Wilson A, Sarpong FAA (2017) Effect of inherent innovativeness and consumer readiness on attitudes to mobile banking. Journal of Financial Services Marketing 22(4):187–201

    Article  Google Scholar 

  • Fu Y, Fu Q (2009) Scheme and secure protocol of mobile payment based on RFID. 3rd IEEE International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID’2009), pp 631-634, 20-22 August 2009, Hong Kong, China

  • Fun TS, Beng LY, Likoh J, Rosla R (2008) A lightweight and private mobile payment protocol by using mobile network operator. In: IEEE International Conference on Computer and Communication Engineering (ICCCE’2008), pp 162-166, 13-15 May 2008, Kuala Lumpur, Malaysia

  • Fun TS, Beng LY, Roslan R, Habeeb HS (2008a) Privacy in new mobile payment protocol. Proceedings of World Academy of Science, Engineering and Technology 2(11):3713–3717

    Google Scholar 

  • Fun TS, Beng LY, Razali MN (2013) Review of mobile macro-payments schemes. Journal of Advances in Computer Networks 1(4):323–327

    Google Scholar 

  • Gackle B, Zuo Y (2014) A new approach for credit extended mobile phone payment. International Journal of Business Information Systems 15(4):434–449

    Article  Google Scholar 

  • Gannamaneni A, Ondrus J, Lyytinen K (2015) A post-failure analysis of mobile payment platforms. In: 48th IEEE Hawaii International Conference on System Sciences (HICSS), pp 1159-1168, 5-8 Jan 2015, HI, USA

  • Gao, J, Edunuru K, Cai J, Shim SPD (2005) P2P-Paid: A peer-to-peer wireless payment system. In: The Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), pp 102-111, 19 July 2005, Munich, Germany

  • Gao L, Waechter KA (2017) Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Information Systems Frontiers (Springer) 19(3):525–548

    Article  Google Scholar 

  • Garner P, Edwards R, Coulton P (2006) Card-based macropayment for mobile phones, IEEE International Conference on. Mobile Business ( ICMB’06), pp 4–4, 26-27 June 2006, Copenhagen, Denmark

  • Garrido PC, Miraz GM, Ruiz IL, Gómez-Nieto MÁ (2010) A model for the development of NFC context-awareness applications on Internet of Things. In: Second IEEE International Workshop On. Near Field Communication (NFC), pp 9-14, 20-20 April 2010, Monaco, Monaco

  • Gaur A, Ondrus J (2012 The role of banks in the mobile payment ecosystem: a strategic asset perspective. In: ACM Proceedings of the 14th Annual International Conference on Electronic Commerce (ICEC’12), pp 171-177, 6-8 August 2012, Singapore

  • Gerpott TJ, Meinert P (2016) Correlates of using the billing system of a mobile network operator to pay for digital goods and services. Information Systems Frontiers (Springer) 18(6):1265–1283

    Article  Google Scholar 

  • Ghezzi A, Renga F, Balocco R, Pescetto P (2010) Mobile Payment Applications: offer state of the art in the Italian market. info 12(5), pp 3-22

  • Ghiron SL, Sposato S, Medaglia CM, Moroni A (2009) NFC ticketing: A prototype and usability test of an NFC-based virtual ticketing application. In: First IEEE International Workshop on Near Field Communication (NFC’09), pp 45-50, 24-24 Feb 2009, Hagenberg, Austria

  • Godbole RM, Pais AR (2008) Secure and efficient protocol for mobile payments. In: Proceedings of the 10th international conference on Electronic commerce (ICEC’08:), pp 1-10, https://doi.org/10.1145/1409540.1409574

  • Goeke L, Pousttchi K (2010) A scenario-based analysis of mobile payment acceptance. In: Ninth IEEE International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), pp 371-378, 13-15 June 2010, Athens, Greece

  • Gogolin G, Gogolin E (2017) The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications. International Journal of Handheld Computing Research (IJHCR) 8(1):42–52

    Article  Google Scholar 

  • Gordon M, Sankaranarayanan S (2010) Biometric security mechanism in mobile paymentts. In: Seventh IEEE International Conference on Wireless And Optical Communications Networks (WOCN), pp 1-6, 06-08 Sep 2010, Colombo, Sri Lanka

  • Gu JC, Lee SC, Suh YH (2009) Determinants of behavioral intention to mobile banking. Expert Systems with Applications (Elsevier) 36(9):11605–11616

    Article  Google Scholar 

  • Guo W (2008) Research on mobile commerce based on RFID. IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE/SOLI’2008), Vol.1, pp 853-857, 12-15 Oct 2008, Beijing, China

  • Guo W (2008a) Design of architecture for mobile payments system. In: IEEE Conference on Control and Decision (CCDC’2008), pp 1732–1735, 2–4, (July 2008) Yantai. Shandong, China

  • Guo J, Nikou S, Bouwman H (2013) Analyzing the business model for mobile payment from banks’ perspective: An empirical study. In: 24th European Regional Conference of the International Telecommunication Society, 20-23 Oct 2013, Florence, Italy

  • Guo J, Nikou S, Bouwman H (2015) Business model for mobile payment in China. International Journal of Systems and Service-Oriented Engineering (IJSSOE) 5(2):20–43

    Article  Google Scholar 

  • Guo J, Bouwman H (2016) An analytical framework for an m-payment ecosystem: A merchants perspective. Telecommunications Policy 40(2):147–167

    Article  Google Scholar 

  • Gupta P (2016) End to end ussd system. TATA Tele Service Limited, INDIA 53(7):54

    MathSciNet  Google Scholar 

  • Gupta S, Johari R (2011) A new framework for credit card transactions involving mutual authentication between cardholder and merchant. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT’2011), pp 22–26, 3–5 (June 2011) Katra. Jammu, India

  • Haddad E, King B (2007) A simple secure m-commerce protocol ssmcp. Int J Comput Sci Netw Secur (IJCSNS) 7(3):220–229

    Google Scholar 

  • Han T, Ding L (2017) Design and implementation of Bluetooth beacon in mobile payment system. In: AIP Conference Proceedings, Vol. 1864, pp 020019

  • Harb H, Farahat H, Ezz M (2008) Securesmspay: secure sms mobile payment model. In: 2nd IEEE International Conference on Anti-counterfeiting, Security and Identification (ASID’2008), pp 11-17

  • Hardy R, Rukzio E, Wagner M, Paolucci M (2009) Exploring expressive nfc-based mobile phone interaction with large dynamic displays. First IEEE International Workshop on Near Field Communication (NFC’09), pp 36-41, 24-24 Feb 2009, Hagenberg, Austria,

  • Hassinen M (2005) SafeSMS-end-to-end encryption for SMS. Proceedings of the 8th International Conference on Telecommunications, (ConTEL’2005), Vol.2, pp 359-365

  • Hassinen M, Hyppönen K, Haataja K (2006) An open, PKI-based mobile payment system. International Conference on Emerging trends in information and communication security 86–100

  • Hassinen M, Hyppönen K, Trichina E (2008) Utilizing national public-key infrastructure in mobile payment systems. Electron Commer Res Appl 7(2):214–231

    Article  Google Scholar 

  • Hedman J, Henningsson S (2012) Competition and collaboration shaping the digital payment infrastructure. In Proceedings of the 14th ACM Annual International Conference on. Electronic Commerce (ICEC’12), 07-08 August 2012, pp 178-185, Singapore

  • Hedman J, Henningsson S (2015) The new normal: Market cooperation in the mobile payments ecosystem. Electron Commer Res Appl 14(5):305–318

    Article  Google Scholar 

  • Herzberg A (2003) Payments and banking with mobile personal devices. Communications of the ACM 46(5):53–58

    Article  Google Scholar 

  • Hu L, Chi L, Li H, Yuan W, Sun Y, Chu J (2012) The classic security application in m2m: the authentication scheme of mobile payment. KSII Transactions on Internet & Information Systems, 6(1)

  • Huang P, Boucouvalas AC (2006) Future personal “e-payment”: Irfm. IEEE Wireless Communications 13(1):60–66

  • Huang X, Bao J, Dai X, Singh E, Huang W, Huang C (2016) M&e-netpay: A micropayment system for mobile and electronic commerce. Symmetry 8(8):74

    Article  MathSciNet  Google Scholar 

  • Humbani M, Wiese M (2018) A cashless society for all: determining consumers’ readiness to adopt mobile payment services. Journal of African Business 19(3):409–429

    Article  Google Scholar 

  • Hwang JJ, Yeh TC, Li JB (2003) Securing on-line credit card payments without disclosing privacy information. Computer Standards & Interfaces 25(2):119–129

    Article  Google Scholar 

  • Hwang RJ, Shiau SH, Jan DF (2007) A new mobile payment scheme for roaming services. Electron Commer Res Appl 6(2):184–191

    Article  Google Scholar 

  • Isaac JT, Sherali Z (2014) Secure mobile payment systems. IT Professional 16(3):36–43

    Article  Google Scholar 

  • Isaac JT, Zeadally S, Cámara JS (2012) A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electronic Commerce Research 12(1):97–123

    Article  Google Scholar 

  • Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL (2013a) Anonymous and fair micropayment scheme with protection against coupon theft. International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), 4(2), pp 54-71

  • Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL, Huguet-Rotger L (2012) Micropayment scheme implementation on the android platform with performance evaluation. In Proceedings of the 10th ACM International Conference on. Advances in Mobile Computing & Multimedia, pp 64-73, 03-05 December 2012, Bali, Indonesia

  • Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL, Huguet-Rotger L (2013b) Micropayment proposal with formal verification using coloured petri nets and performance analysis on the android platform. International Journal of Business Intelligence and Data Mining 8(1):74–104

    Article  MATH  Google Scholar 

  • Islam SH, Amin R, Biswas G, Obaidat MS, Khan MK (2016) Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering 41(8):3163–3176

    Article  MathSciNet  MATH  Google Scholar 

  • Ityala S, Sharma O, Honnavalli PB (2019 Transparent watermarking qr code authentication for mobile banking applications. In International Conference on Inventive Computation Technologies, pp 738-748

  • Jain AK, Shanbhag D (2012) Addressing security and privacy risks in mobile applications. IT Professional 14(5):28–33

    Article  Google Scholar 

  • Jatoth C, Gangadharan G, Buyya R (2017) Computational intelligence based qos-aware web service composition: a systematic literature review. IEEE Trans Serv Comput 10(3):475–492

    Article  Google Scholar 

  • Jiang N, Liu X, Zhao J, Yang D (2009) A mobile micropayment protocol based on chaos. In Eighth IEEE International Conference onMobile Business (ICMB’2009), pp 284-289, 27-28 June 2009, Dalian, China

  • Jiang N, Ri-jing Y, Zheng-kui L et al (2010) Mobile micropayment protocol based on chaotic dual hash chains. Journal of Jilin University (Engineering and Technology Edition) 2:055

    Google Scholar 

  • Juang W-S (2010) Ro-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. Journal of Systems and Software 83(4):638–645

    Article  Google Scholar 

  • Kadhiwal S, Zulfiquar AUS (2007) Analysis of mobile payment security measures and different standards. Comput Fraud Secur 6:12–16

    Article  Google Scholar 

  • Kang B, Du J, Han Y, Qian K (2020) A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service. Int J Netw Secur 22(6):945–953

    Google Scholar 

  • Kanniainen L (2010) Alternatives for banks to offer secure mobile payments. Intl J Bank Market 28(5):433–444

    Article  Google Scholar 

  • Kao DT (2009) The impact of transaction trust on consumers’ intentions to adopt m-commerce: A cross cultural investigation. CyberPsychology & Behavior 12(2):225–229

    Article  Google Scholar 

  • Karnouskos S (2004) Mobile payment: a journey through existing procedures and standardization initiatives. IEEE Communications Surveys & Tutorials 6(4)

  • Karpischek S, Michahelles F, Bereuter A, Fleisch E (2009) A maintenance system based on near & #xC;field communication. In Third IEEE International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST’09), pp 234–238, 15–18 (September 2009) Cardi. Wales, UK

  • Karpischek S, Michahelles F, Resatsch F, Fleisch E (2009a) Mobile sales assistant-an nfc-based product information system for retailers. In First IEEE International Workshop on Near Field Communication, (NFC’09), pp 20-23, 24-24 .Feb 2009, Hagenberg, Austria

  • Kashif M (2014) Secure SMS communication using encryption gateway and digital signature. In Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on, pp 1430-1434

  • Kazan E, Damsgaard J (2013) A framework for analyzing digital payment as a multi-sided platform: A study of three european NFC solutions. pp 1-13

  • Kefalakis N, Leontiadis N, Soldatos J, Gama K, Donsez D (2008) Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform. In ACM Proceedings of the ACM/IFIP/USENIX (Middleware’08), pp 66-69, 01-05 December 2008, Leuven, Belgium

  • Kim S, Oh H (2001) An Atomic Micropayment System for a Mobile Computing Environment. IEICE Transactions on information and Systems 84(6):709–716

    Google Scholar 

  • Kisore N.R, Sagi S (2015) A secure SMS protocol for implementing digital cash system. 4th International Conference On Advances in Computing, Communications and Informatics (ICACCI), pp 1883-1892, 10-13 August 2015, Kochi, India

  • Kitchenham B (2004) Procedures for performing systematic reviews. Vol. 33, pp 1-26, Keele, UK, Keele University

  • Kneissl F, Rottger R, Sandner U, Leimeister JM, Krcmar H (2009) All-i-touch as combination of nfc and lifestyle. In First IEEE International Workshop on Near Field Communication (NFC’09), pp 51-55, 24-24 Feb 2009, Hagenberg, Austria

  • Köbler F, Koene P, Krcmar H, Altmann M, Leimeister JM (2010) LocaTag-An NFC-based system enhancing instant messaging tools with real-time user location. Second IEEE International Workshop on Near Field Communication (NFC), pp 57-61, 20-20 April 2010, Monaco, Monaco

  • Kounelis I, Zhao H, Muftic S (2011) Secure middleware for mobile phones and uicc applications. In International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp 143-152, 22-24 June 2011, London, UK

  • Kumar D, Ryu Y (2009) A brief introduction of biometrics and fingerprint payment technology. International Journal of advanced science and Technology 4:25–38

    Google Scholar 

  • Kumar S, Rabara S (2010) An architectural design for secure mobile remote macro-payments. Journal of Next Generation Information Technology 1(2)

  • Kungpisdan S, Srinivasan B, Le PD (2003) Lightweight mobile credit-card payment protocol. In International Conference on Cryptology in India, pp 295-308

  • Kungpisdan S, Srinivasan B, Le PD (2004) A secure account-based mobile payment protocol. In IEEE International Conference on Information Technology: Coding and Computing, (ITCC’2004), pp 35-39, 5-7 April 2004, Vol. 1, pp:35-39, Las Vegas, NV, USA

  • Kungpisdan S (2005) Modelling, design, and analysis of secure mobile payment systems. Dissertation, Monash University

  • Kungpisdan S (2010a) Accountability of centralized payment systems: formal reasoning, protocol design and analysis. IETE Technical Review 27(5):351–364

    Article  Google Scholar 

  • Kungpisdan S, Warasart M (2010b) SOMP: An SMS-based Operator-assisted Mobile Payment Protocol. IEEE Proceedings of the 1st International Computer Science and Engineering Conference (ICSEC’2010), pp 29-34, Chiangmai, Thailand

  • Labrou Y, Agre J, Ji L, Molina J, Chen WI (2004) Wireless wallet. The First Annual International Conference on. Mobile and Ubiquitous Systems: Networking and Services, (MOBIQUITOUS’2004), pp 32–41, 22–26 (August 2004) Boston. MA, USA

  • Lacmanović I, Radulović B, Lacmanović D (2010) Contactless payment systems based on RFID technology. Proceedings of the IEEE 33rd International Convention (MIPRO’2010), pp 1114-1119, 24-28 May 2010, Opatija, Croatia

  • Lam KY, Chung SL, Gu M, Sun JG (2003) Lightweight security for mobile commerce transactions. Computer Communications 26(18):2052–2060

    Article  Google Scholar 

  • Lee J, Cho CH, Jun MS (2011) Secure quick response-payment (qr-pay) system using mobile device. 13th IEEE International Conference on Advanced Communication Technology (ICACT), pp 1424-1427, 13-16 Feb 2011, Gangwon-Do, Korea (South)

  • Lee JS, You HN, Cho CH, Jun MS (2012) A design secure qr-login user authentication protocol and assurance methods for the safety of critical data using smart device. The Journal of Korean Institute of Communications and Information Sciences 37(10):949–964

    Article  Google Scholar 

  • Lee O (2004) Sound-based mobile payment system. In Proceedings of the IEEE International Conference on. Web Services, (ICWS-2004), pp 820–821, 6–9 (July 2004) San Diego. California, USA

  • Leong CM, Tan KL, Puah CH, Chong SM (2020) Predicting mobile network operators users m-payment intention. European Business Review, Emerald Publishing Limited, https://doi.org/10.1108/EBR-10-2019-0263

    Article  Google Scholar 

  • Lerner T (2013) The Market. Mobile payment (Springer) 13–22

  • Levisse A, Manuel N, Sjolund M (2008) Getting more from prepaid mobile services. McKinsey Quarterly

  • Li J, Li J (2009) Model checking the set purchasing process protocol with spin. In 5th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom’09), pp 1-4, 24-26 September 2009, Beijing, China

  • Li L, Tao L (2009) Security study of mobile business based on WPKI. In IEEE Eighth International Conference on. Mobile Business (ICMB’2009), pp 301-304, 27-28 June 2009, Dalian, China

  • Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 35(2):188–195

    Article  Google Scholar 

  • Li W, Xia Y, Lu L, Chen H, Zang B (2019) TEEv: virtualizing trusted execution environments on mobile platforms. In Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp 2-16

  • Li Y, Zhang X (2004) A security-enhanced one-time payment scheme for credit card. Proceedings. 14th International Workshop on Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, pp 40-47

  • Liébana-Cabanillas F, Higueras-Castillo E, Molinillo S, Montañez MR (2019) Assesing the role of risk and trust in consumers’ adoption of online payment systems. Int J Inf Syst oftw Eng Big Compan (IJISEBC) 5(2):99–113

    Google Scholar 

  • Liébana-Cabanillas F, Ramos de Luna I, Montoro-Ríos FJ (2015) User behaviour in QR mobile payment system: the QR Payment Acceptance Model. Technology Analysis & Strategic Management 27(9):1031–1049

    Article  Google Scholar 

  • Liébana-Cabanillas F, Sánchez-Fernández J, Muñoz-Leiva F (2014) Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Computers in Human Behavior 35:464–478

    Article  Google Scholar 

  • Lin P, Chen HY, Fang Y, Jeng JY, Lu FS (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Transactions on Wireless Communications 7(7)

  • Lisonek D, Drahanskỳ M (2008) SMS encryption for mobile communication. International Conference on Security Technology (SECTECH’08), pp 198-201

  • Liu J, Liao J, Zhu X (2005) A system model and protocol for mobile payment. In IEEE International Conference on e-Business Engineering (ICEBE-2005), pp 638-641, 18-20 Oct 2005, Beijing, China

  • Liu X, Zhang H, Fang J, Guan G, Huang Y (2016) Intelligent shopping cart with quick payment based on dynamic target tracking. In IEEE 4th International Conference on Cloud Computing and Intelligence Systems (CCIS’2016), pp 88-93, 17-19 August 2016, Beijing, China

  • Liu Y, Zhao Q, Liu G, Chang L, Shen J (2017) A fairness-enhanced micropayment scheme. Wireless Personal Communications 96(4):5267–5278

    Article  Google Scholar 

  • Lo J, Li-C Bishop J, Eloff JHP (2008) SMSSec: An end-to-end protocol for secure SMS. Computers & Security 27(5):154–167

    Article  Google Scholar 

  • Lo NW, Yohan A (2020) BLE-based authentication protocol for micropayment using wearable device. Wireless Personal Communications 112(4):2351–2372

    Article  Google Scholar 

  • Lu J, Yang Z, Li L, Yuan W, Li L, Chang CC (2017) Multiple schemes for mobile payment authentication using qr code and visual cryptography. Mobile Information Systems (Hindawi)

  • Luarn P, Lin HH (2005) Toward an understanding of the behavioral intention to use mobile banking. Computers in human behavior 21(6):873–891

    Article  Google Scholar 

  • Lukkari J, Korhonen J, Ojala T (2004) SmartRestaurant: mobile payments in context-aware environment. ACM Proceedings of the 6th international conference on Electronic commerce (ICEC’2004), pp 575-582, 25-27 October 2004, Delft, Netherlands

  • Madan S (2016) Securing Transactions and Payment Systems for M-commerce. IGI Global

  • Mainetti L, Patrono L, Vergallo R (2012) Idapay: A secure and efficient micro-payment system based on peer-to-peer nfc technology for android mobile devices. Journal of Communications Software and Systems 8(4):117–125

    Article  Google Scholar 

  • Mali V (2016) Demonetization: A step towards modified india. International Journal of Commerce and Management Research 2(12):35–36

    Google Scholar 

  • Mallat N (2007) Exploring consumer adoption of mobile payments-a qualitative study. The Journal of Strategic Information Systems 16(4):413–432

    Article  Google Scholar 

  • Marcus A, Davidzon G, Law D, Verma N, Fletcher R, Khan A, Sarmenta L (2009) Using NFC-enabled mobile phones for public health in developing countries. In First IEEE International Workshop on Near Field Communication (NFC’09), pp 30-35, 24-24 Feb 2009, Hagenberg, Austria

  • Marforio C, Karapanos N, Soriente C, Kostiainen K, Capkun S (2014) Smartphones as practical and secure location verification tokens for payments. NDSS 14:23–26

    Google Scholar 

  • Markoska K, Ivanochko I et al (2017) Mobile Banking Services-Business Information Management with Mobile Payments. Agile Information Business 125–175

  • Martins C, Oliveira T, Popovič A (2014) Understanding the internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. International Journal of Information Management 34(1):1–13

    Article  Google Scholar 

  • Massoth M, Bingel T (2009) Performance of different mobile payment service concepts compared with a NFC-based solution. In Fourth International Conference on Internet and Web Applications and Services (ICIW’09), pp 205-210, 24-28 May 2009, Venice/Mestre, Italy

  • Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3):709–734

    Article  Google Scholar 

  • Mazumdar A, Giri D (2012) On-line electronic payment system using signcryption. Procedia Technology 6:930–938

    Article  Google Scholar 

  • Me G, Schuster A (2005) A mobile local payment system bluetooth based. In International Symposium on Wireless Communications (ISWSN’05)

  • Me G, Strangio MA (2005a) EC-PAY: an efficient and secure ECC-based wireless local payment scheme. In Third IEEE International Conference on Information Technology and Applications (ICITA’2005), Vol. 2, pp 442-447, 4-7 July 2005, Sydney, Australia

  • Mezgec Z, Medved A, Chowdhury A, Svečko R (2008) Mobile Payments-Design of New Terminal. Informacije MIDEM 38(1):53–60

    Google Scholar 

  • Miraz G, Ruiz IL, Gómez-Nieto MÁ (2009) How NFC can be used for the compliance of European higher education area guidelines in European universities. In First IEEE International Workshop on. Near Field Communication (NFC’09), pp 3-8, 24-24 Feb 2009, Hagenberg, Austria

  • Mjolsnes SF, Rong C (2001) Localized credentials for server assisted mobile wallet. In IEEE International Conference on Computer Networks and Mobile Computing, pp 203-208, 16-19 Oct 2001, Beijing, China

  • Monteiro DM, Rodrigues JJ, Lloret J (2012) A secure nfc application for credit transfer among mobile phones. In IEEE International Conference on Computer, Information and Telecommunication Systems (CITS’2012), pp 1-5, 14-16 May 2012, Amman, Jordan

  • Moonsamy V, Batten L (2014) Mitigating man-in-the-middle attacks on smartphones-a discussion of ssl pinning and dnssec. In Proceedings of the 12th Australian Information Security Management Conference, pp 5-13

  • Morak J, Hayn D, Kastner P, Drobics M, Schreier G (2009) Near field communication technology as the key for data acquisition in clinical research. In First IEEE International Workshop on. Near Field Communication (NFC’09), pp 15-19, 24- 24 Feb 2009, Hagenberg, Austria

  • Morak J, Kollmann A, Schreier G et al (2007) Feasibility and usability of a home monitoring concept based on mobile phones and near & #xC;field communication (nfc) technology. Medinfo, IOS Press 2007:112–116

    Google Scholar 

  • Morak J, Schwetz V, Hayn D, Fruhwald F, Schreier G (2008) Electronic data capture platform for clinical research based on mobile phones and near field communication technology. In 30th Annual IEEE International Conference on. Engineering in Medicine and Biology Society (EMBS’2008), pp 5334–5337, 20–25 (August 2008) Vancouver. BC, Canada

  • Naji AW, Housain AS, Zaidan B, Zaidan A, Hameed SA (2011) Security improvement of credit card online purchasing system. Scientific Research and Essays 6(16):3357–3370

    Article  Google Scholar 

  • Nandakuma R, Chintalapudi KK, Padmanabhan V, Venkatesan R (2013) Dhwani: secure peer-to-peer acoustic nfc. ACM SIGCOMM Computer Communication Review 43:63–74

    Article  Google Scholar 

  • Naor M, Shami A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques 1–12

  • Narendiran C, Rabara S.A, Rajendran N (2009) Public key infrastructure for mobile banking security. In IEEE Global Mobile Congress, pp 1-6, 12-14 October 2009, Shanghai, China

  • Neefs J, Schrooyen F, Doggen J, Renckens K (2010) Paper ticketing vs. electronic ticketing based on off-line system’tapango’. In Second IEEE International Workshop on Near Field Communication (NFC’2010), pp 3-8, 20-20 April 2010, Monaco, Monaco

  • Ngo HH, Dandash O, Le PD, Srinivasan B, Wilson C (2011) Formal verification of a secure mobile banking protocol. International Conference on Computer Science and Information Technology 410–421

  • Nithya N, Kiruthika R (2021) Impact of Business Intelligence Adoption on performance of banks: a conceptual framework. J Ambient Intell Human Comput 12:3139–3150. https://doi.org/10.1007/s12652-020-02473-2

    Article  Google Scholar 

  • Nguyen T, Shum P, Chua E (2005) Secure end-to-end mobile payment system. IET

  • Nosrati L, Bidgoli A (2015) Security assessment of mobile-banking. In International Conference and Workshop on. Computing and Communication (IEMCON), pp 1–5. 15–17 (October 2015) University of British Columbia. Vancouver, Canada

  • Nseir S, Hirzallah N, Aqel M (2013) A secure mobile payment system using qr code. 5th International Conference on Computer Science and Information Technology (CSIT), pp 111-114

  • Ntt DoCoMo IM (2017) Mobile payments via phone bill. https://www.nttdocomo.co.jp/

  • Nuakoh EB, Coffie I (2018) MonitR®: A Mobile Application for Monitoring Online Accounts’ Security. SoutheastCon 2018:1–9

    Google Scholar 

  • Nyamtiga BW, Sam A, Laizer LS (2013) Security perspectives for ussd versus sms in conducting mobile transactions: A case study of tanzania. International journal of technology enhancements and emerging engineering research 1(3):38–43

    Google Scholar 

  • Obinna O, Pfluegel E, Tunnicliffe MJ, Clarke CA (2018) Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp 1–7, 11–12 (June 2018) Glasgow. Scotland, UK

  • Odelu V, Das AK, Goswami A (2016) SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics 62(1):30–38

    Article  Google Scholar 

  • Oh S (2006)A stakeholder perspective on successful electronic payment systems diffusion. In Proceedings of the 39th IEEE Annual Hawaii International Conference on System Sciences (HICSS’06), 4-7 Janualry 2006, Vol. 8, pp 186b-186b, Kauia, HI, USA

  • Ok K, Coskun V, Ozdenizci B (2012) Near field communication: From theory to practice. John Wiley and Sons

  • Oliveira T, Thomas M, Baptista G, Campos F (2016) Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior 61:404–414

    Article  Google Scholar 

  • Ondrus J, Camponovo G, Pigneur Y (2005) A proposal for a multi-perspective analysis of the mobile payment environment. In IEEE International Conference on. Mobile Business (ICMB’2005), pp 659-662, 11-13 July 2005, Sydney, Australia

  • Ondrus J, Lyytinen K, Pigneur Y (2009) Why mobile payments fail? towards a dynamic and multiperspective explanation. In Proceedings of the 42nd Annual Hawaii International Conference on System Sciences (HICSS’2008), 05-08 January 2009, pp 1-10, Waikoloa, Big Island, Hawaii

  • Ondrus J, Pigneur Y (2006) A multi-stakeholder multicriteria assessment framework of mobile payments: an illustration with the swiss public transportation industry. In Proceedings of the 39th IEEE Annual Hawaii International Conference on System Sciences (HICSS’06), Vol. 2, pp 42a–42a, 4–7 (January 2006) Kauia. HI, USA

  • Ondrus J, Pigneur Y (2009) Near field communication: an assessment for future payment systems. Information Systems and E-Business Management 7(3):347–361

    Article  Google Scholar 

  • Ou CM, Ou CR (2009) Adaptation of proxy certificates to non-repudiation protocol of agent based mobile payment systems. Applied Intelligence 30(3):233–243

    Article  MathSciNet  Google Scholar 

  • OWASP-2014 https://owasp.org/www-project-mobile-top-10/ (Accessed: 06-09-2020)

  • Pal D, Khethavath P, Chen T, Zhang Y (2017) Mobile payments in global markets using biometrics and cloud. International Journal of Communication Systems 30(14):e3293

    Article  Google Scholar 

  • Paret D, Riesco R (2005) RFID and contactless smart card applications. Wiley Online Library

  • Párhonyi R, Nieuwenhuis LJM, Pras A (2005) Second generation micropayment systems: lessons learned. ECommerce, E-Business, and E-Government, In Challenges of Expanding Internet, pp 345–359

  • Park J, Baek K, Kang C (2013) Secure profile provisioning architecture for embedded UICC. In IEEE Eighth International Conference on. Availability, Reliability and Security (ARES’13), pp 297-303, 2-6 September 2013, Regensburg, Germany

  • Park J, Kim K, Kim M (2008) The aegis: Uicc-based security framework. In Second IEEE International Conference on. Future Generation Communication and Networking, (FGCN’08), 13-15 December 2008, Vol. 1, pp 264-269, Sanya, Hainan Island, China

  • Pasquet M, Reynaud J, Rosenberger C (2008) Secure payment with nfc mobile phone in the smarttouch project. In IEEE International Symposium on. Collaborative Technologies and Systems (CTS’2008), pp 121–126, 19–23 (May 2008) Irvine. CA, USA

  • Patel R, Kunche A, Mishra N, Bhaiyat Z, Joshi R (2015) Paytooth-a cashless mobile payment system based on bluetooth. International Journal of Computer Applications 120(24)

  • Paulson LC (2003) Verifying the set protocol: Overview. Formal Aspects of Security 4–14

  • Popescu C (2009) An anonymous mobile payment system based on bilinear pairings. Informatica 20(4):579–590

    Article  MathSciNet  MATH  Google Scholar 

  • Pourghomi P, Ghinea G et al (2013) A proposed nfc payment application. International Journal of Advanced Computer Science and Applications (IJACSA), 2013arXiv preprint arXiv:1312.2828, 4

  • Pousttchi K (2008) A modeling approach and reference models for the analysis of mobile payment use cases. Electron Commer Res Appl 7(2):182–201

    Article  Google Scholar 

  • Pousttchi K, Schiessler M, Wiedemann DG (2009) Proposing a comprehensive framework for analysis and engineering of mobile payment business models. Information Systems and E-Business Management 7(3):363–393

    Article  Google Scholar 

  • Pousttchi K. Schurig M (2004) Assessment of today’s mobile banking applications from the view of customer requirements. In Proceedings of the IEEE 37th Annual Hawaii International Conference on System Sciences, pp 10

  • Pradhan S, Lawrence E, Zmijewska A (2005) Bluetooth as an enabling technology in mobile transactions. International Conference on Information Technology: Coding and Computing, (ITCC’ 2005), Vol. 2, pp 53-58

  • Prakasha K, Muniyal B, Acharya V (2019) Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure. Information Discovery and Delivery

  • Qadeer M.A., Akhtar N, Govil S, Varshney A (2009) A novel scheme for mobile payment using RFID-enabled smart SIMcard. In IEEE International Conference on. Future Computer and Communication (ICFCC’2009), 3–5 (April 2009). Kuala Lumpar, Malaysia, pp 339–343

  • Qi M, Yang C (2006) Design and applications of wireless set protocol. In Proceedings of the 3rd ACM international conference on Mobile technology, applications & systems, 25-27 October 2006, page 18, Bangkok, Thailand

  • Rahman NABA, Harun KSB, Yusof YB (2013) SMS banking transaction as an alternative for information, transfer and payment at merchant shops in malaysia. 3rd International Conference on Information Technology and e-Services (ICITeS’2013), pp 1-6

  • Romao A, da Silva MM (2001) Secure mobile agent digital signatures with proxy certificates. In E-Commerce Agents, pp 206-220

  • Rubinov K, Rosculete L, Mitra T, Roychoudhury A (2016) Automated partitioning of android applications for trusted execution environments. In 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), pp 923-934

  • Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1, pp 57-64

  • Sadeghi A, Bagheri H, Garcia J, Malek S (2017) A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software. IEEE Transactions on Software Engineering 43(6):492–530

    Article  Google Scholar 

  • Saeed MQ, Walter C, Pourghomi P, Ghinea G (2014) Mobile Transactions over NFC and GSM. IARIA

  • Samadani MH., Shajari M, Ahaniha M (2010) A survey on mobile digital signature models. In Proceedings of the 12th ACM International Conference on. Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC’10), pp 141–145, 02–04 (August 2010) Honolulu. HI, USA

  • Samanta S, Mohandas R, and Pais A.R (2012) Secure short message peer-to-peer protocol. International Journal of Electronic Commerce Studies, 3(1), pages 45

  • Sánchez I, Cortés M, Riekki J (2007), Controlling multimedia players using nfc enabled mobile phones. In ACM Proceedings of the 6th international conference on. Mobile and ubiquitous multimedia (MUM’07), 12–14 (December 2007). Oulu, Finland, pp 118–124

  • Sarajlic A, Omerasevic D (2007) Access channels in m-commerce services. 29th IEEE International Conference on Information Technology Interfaces (ITI’2007), 25–28 June 2007. Cavtat / Dubrovnik, Croatia, pp 507–512

  • Saxena A, Das ML, Gupta A (2005) Mmps: a versatile mobile-to-mobile payment system. In IEEE International Conference on Mobile Business (ICMB’2005), 11–13 (July 2005). Australia, Sydney, pp 400–405

  • Saxena N, Chaudhari NS (2012) Secure encryption with digital signature approach for short message service. In IEEE World Congress on, Information and Communication Technologies (WICT’2012), pp 803-806

  • Saxena N, Shen H, Komninos N, Choo KR, Chaudhari NS (2018) BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users. IEEE Transactions on Dependable and Secure Computing 17(3):550–565

    Google Scholar 

  • Schilke PF, Schierz O, Wirtz BW (2010) Understanding consumer acceptance of mobile payment services: An empirical analysis. Electron Commer Res Appl 9(3):209–216

    Article  Google Scholar 

  • See-To EW, Papagiannidis S, Westland JC (2014) The moderating role of income on consumers’ preferences and usage for online and offline payment methods. Electronic Commerce Research 14(2):189–213

    Article  Google Scholar 

  • Sekhar VC, Sarvabhatla M (2012) A secure account-based mobile payment protocol with public key cryptography. ACEEE International Journal on Network Security 3(1):5–9

    Google Scholar 

  • Shaghayegh B (2011) Using service oriented architecture in a new anonymous mobile payment system. In IEEE 2nd International Conference on. Software Engineering and Service Science (ICSESS), 15–17 (July 2011). Beijing, China, pp 393–396

  • Shaikh AA, Karjaluoto H (2015) Mobile banking adoption: A literature review. Telematics and Informatics 32(1):129–142

    Article  Google Scholar 

  • Shedid SM, Kouta M (2010) Modified set protocol for mobile payment: an empirical analysis. In 2nd IEEE International Conference on. Software Technology and Engineering (ICSTE’2010), Vol. 1, pp V1–350, 03–05 (October 2010) San Juan. PR, USA

  • Sherif MH (2016) Protocols for secure electronic commerce. CRC Press

    Google Scholar 

  • Sherman M (2014), An introduction to mobile payments: market drivers, applications, and inhibitors. In Proceedings of the: 1st ACM International Conference on Mobile Software Engineering and Systems, (MOBILESoft’14), Hyderabad, India, June 2-3, 2014, pp 71-74

  • Shin DH (2009) Towards an understanding of the consumer acceptance of mobile wallet. Computers in Human Behavior 25(6):1343–1354

    Article  Google Scholar 

  • Shin DH (2010) Modeling the interaction of users and mobile payment system: Conceptual framework. International Journal of Human-Computer Interaction 26(10):917–940

    Article  Google Scholar 

  • Siira E, Törmänen V (2010) The impact of NFC on multimodal social media application. In Second IEEE International Workshop on. Near Field Communication (NFC), 20–20 (April 2010). Monaco, Monaco, pp 51–56

  • Siira, E, Tuikka T, Törmänen V (2009) Location-based mobile wiki using nfc tag infrastructure. In First IEEE International Workshop on. Near Field Communication, (NFC’09)

  • Sinigaglia F, Carbone R, Costa G, Ranise S (2019) Mufasa: A tool for high-level specification and analysis of multi-factor authentication protocols. In Second International Workshop on Emerging Technologies for Authorization and Authentication, (ETAA’2019), pp 138-155, 27 September 2019, Luxembourg,

  • Slade E, Williams M, Dwivedi Y, Piercy N (2015) Exploring consumer adoption of proximity mobile payments. Journal of Strategic Marketing 23(3):209–223

    Article  Google Scholar 

  • Slade EL, Williams MD, Dwivedi YK (2013) Mobile payment adoption: Classification and review of the extant literature. The Marketing Review 13(2):167–190

    Article  Google Scholar 

  • Solat S (2017) Security of electronic payment systems: A comprehensive survey. arXiv preprint arXiv:1701.04556

  • Sorooshian S (2017) Business ethics for mobile network operators. Science and Engineering Ethics 1–2

  • Steffen R, Preißinger J, Schöllermann T, Müller A, Schnabel I (2010) Near field communication (NFC) in an automotive environment. In Second IEEE International Workshop on. Near Field Communication (NFC), 20–20 (April 2010). Monaco, Monaco, pp 15–20

  • Strommer E, Kaartinen J, Parkka J, Ylisaukkooja A, Korhonen I (2006) Application of near field communication for health monitoring in daily life. In 28th IEEE Annual International Conference on. Engineering in Medicine and Biology Society (EMBS’06), August 30–3 (Sept 2006). New York, NY, USA, pp 3246–3249

  • Subpratatsavee P, Kuacharoen P (2015a) Transaction authentication using HMAC-based one-time password and QR code. Computer Science and its Applications 93–98

  • Subpratatsavee P, Kuacharoen P (2015b) Internet banking transaction authentication using mobile one-time password and qr code. Advanced Science Letters 21(10):3189–3193

    Article  Google Scholar 

  • Sulaiman A, Jaafar NI, Mohezar S (2006) An overview of mobile banking adoption among the urban community. International Journal of Mobile Communications 5(2):157–168

    Article  Google Scholar 

  • Suryotrisongko H, Setiawan B et al (2012) A novel mobile payment scheme based on secure quick response payment with minimal infrastructure for cooperative enterprise in developing countries. Procedia-Social and Behavioral Sciences 65:906–912

    Article  Google Scholar 

  • Tabakovic A (2014) The prepaid mobile wallet: A powerful product for an impatient ecosystem. Journal of Payments Strategy & Systems 8(3):254–263

    Google Scholar 

  • Tansakul P, Halgamuge MN, Syed A (2019) Distinguish significant adoption factors that influence users’ behavioral expectation to utilize mobile payment: A survey. Structural Equation Modeling Approaches to E-Service Adoption 148–168

  • Tanwar S et al (2016) Implementation of fairexchange and anonymous online e-cash protocol for e-commerce. International Journal of Information Technology and Computer Science (IJITCS) 8(8):66

    Article  Google Scholar 

  • Tehrani MA, Amidian AA, Muhammadi J, Rabiee H (2010) A survey of system platforms for mobile payment. In Fourth International Conference on. Management of e-Commerce and e-Government (ICMeCG’2010), 23–24 (October 2010). Chengdu, China, pp 376–381

  • Téllez Jesús, Zeadally S (2017a) Architectures and models for mobile payment systems. In Mobile Payment Systems, pp 35-91

  • Téllez Jesús, Zeadally S (2017b) Mobile payment systems. Springer

  • Terziyan V (2002) Ontological modelling of e-services to ensure appropriate mobile transactions. Intelligent Systems in Accounting, Finance and Management 11(3):159–172

    Article  Google Scholar 

  • Thakur R, Srivastava M (2014) Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in india. Internet Research 24(3):369–392

    Article  Google Scholar 

  • Thammarat C. Kurutach W (2018) A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification. Wireless Communications and Mobile Computing (Hindawi)

  • Thammarat C. Kurutach W (2019) A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. International Journal of Communication Systems, page e3991

  • Thammarat C (2020) Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol. Symmetry (MDPI) 12(10):1649

    Article  Google Scholar 

  • Ting S, Tsang A.H (2012) Design of an RFID-based inventory control and management system: a case study. Faculty of engineering at the university of the west indies and the council of caribbean engineering organisations in trinidad and tobago, The West Indian journal of engineering

  • Tiwari R, Buse S, Herstatt C (2007) Mobile services in banking sector: the role of innovative business solutions in generating competitive advantage: Technology and innovation managment working paper no. 48

  • Toorani M, Beheshti A (2008a) SSMS-A secure SMS messaging protocol for the m-payment systems. IEEE Symposium on Computers and Communications, (ISCC’2008), pp 700-705

  • Toorani M, Beheshti A (2008b) LPKI-a lightweight public key infrastructure for the mobile environments. 11th IEEE Singapore International Conference on Communication Systems (ICCS’2008), 19–21 November 2008. Guangzhou, China, pp 162–166

  • Trichina E, Hyppönen K, Hassinen M (2007) SIM-enabled open mobile payment system based on nation-wide PKI. ISSE 355–366

  • Tripathi D.M (2011) A note on modified set protocol for mobile payment. In IEEE Sixth International Conference on. Internet Technology and Secured Transactions (ICITST’2011), pp 639-641, 11-14 December, Abu Dhabi, UAE

  • Tsaur WJ, Yeh LY, Juang TY (2011) Efficient and secure ECC-based electronic cash payment applications for internet consumers. In The 18th Int’l Conf on Internet Computing and Internet of Things (ICOMP’17), 17–20, (2017) Las Vegas. Nevada, USA

  • Tuecke S, Welch V, Engert D, Pearlman L, Thompson M et al (2004) Internet X.509 public key infrastructure (pki) proxy certificate profile. Technical report, RFC-3820 (Proposed Standard)

  • Turk I, Angin P, Cosar A (2019) RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions. IEEE Access 7:95315–95328

    Article  Google Scholar 

  • Van Damme G, Luyckx N, Wouters K (2011) A PKI-based mobile banking demonstrator. EuroPKI 147–158

  • Varshney U (2002) Mobile payments. Computer 35(12):120–121

    Article  Google Scholar 

  • Veijalainen J, Terziyan V, Tirri H (2006) Transaction management for m-commerce at a mobile terminal. Electron Commer Res Appl 5(3):229–245

    Article  Google Scholar 

  • Vergara M, Díaz-Hellín P, Fontecha J, Hervás R, Sánchez-Barba C, Fuentes C, Bravo J (2010) Mobile prescription: An NFC-based proposal for AAL. In Second IEEE International Workshop on. Near Field Communication (NFC), pp 27-32, 20-20 April 2010, Monaco, Monaco

  • Verkijika SF (2020) An affective response model for understanding the acceptance of mobile payment systems. Electron Commer Res Appl, 39(100905), https://doi.org/10.1016/j.elerap.2019.100905

  • Vesal SN, Fathian M (2012) Efficient and secure credit card payment protocol for mobile devices. International Journal of Information and Computer Security 5(2):105–114

    Article  Google Scholar 

  • Viehland D, Leong RSY (2007) Acceptance and use of mobile payments. ACIS 2007 Proceedings, page 16

  • Vincent OR, Okediran TM, Abayomi-Alli AA, Adeniran OJ (2020) An identity-based elliptic curve cryptography for mobile payment security. SN Computer Science 1(2):1–12

    Article  Google Scholar 

  • Wan Z, Qing W (2010) Secure mobile payment based on super set protocol. In 2nd IEEE International Conference on. Advanced Computer Control (ICACC), Vol 2, pp 640-643, 27-29 March 2010, Shenyang, China

  • Wang C, Sun H, Zhang H, Jin Z (2013) An improved off-line electronic cash scheme. In Fifth IEEE International Conference on. Computational and Information Sciences (ICCIS’2013), pp 438-441, 21-23 June 2013, Shiyang, China

  • Wang F, Chang CC, Chang SC (2016a) Robust off-line e-cash scheme with recoverability and anonymity revocation. Security and Communication Networks 9(14):2412–2421

    Article  Google Scholar 

  • Wang F, Chang C-C, Lin C (2016b) Security analysis on secure untraceable off-line electronic cash system. IJ Network Security 18(3):454–458

    Google Scholar 

  • Wang JS, Yang FY, Paik I (2011) A novel ecash payment protocol using trapdoor hash function on smart mobile devices. Int J Comput Sci Netw Secur (IJCSNS) 11(6):12–19

    Google Scholar 

  • Wazid M, Zeadally S, Das AK (2019) Mobile banking: Evolution and threats: Malware threats and security solutions. IEEE Consumer Electronics Magazine 8(2):56–60

    Article  Google Scholar 

  • Wei KJ, Lee JS, Chen SJ (2015) Enhancing the Security of Credit Card Transaction based on Visual DSC. KSII Transactions on Internet and Information Systems (TIIS) 9(3):1231–1245

    Google Scholar 

  • Wen X, Chen Y, Fang J (2013) An interbank e-payment protocol based on quantum proxy blind signature. Quantum information processing 12(1):549–558

    Article  MathSciNet  MATH  Google Scholar 

  • Xin W, Yuan CW (2010) An semi-anonymity offline mobile payment protocol based on smart card. J China Univ Posts Telecommun 17:63–66

    Article  Google Scholar 

  • Xu J, Xue K, Yang Q, Hong P (2018) PSAP: Pseudonym-based secure authentication protocol for NFC applications. IEEE Transactions on Consumer Electronics 64(1):83–91

    Article  Google Scholar 

  • Yang D, Wang Q (2011) The study on the application of rfid-based mobile payment to the internet of things. In International Conference on. Multimedia Technology (ICMT’2011), pp 908-911, 26-28 July 2011, Hangzhou, China

  • Yang F.Yi, Liu Z.Wei, Chiu SH (2011) Mobile banking payment system. Wirel Mob Netw Ubiquitous Comput Dependable Appl 2(3):85-95

  • Yang FY, Chiu SH, Chen HY (2012) A new E-cash scheme based on a trapdoor hash function. Adv Inf Sci Serv Sci pp 229-237

  • Yang KC (2005) Exploring factors affecting the adoption of mobile commerce in singapore. Telematics Inform 22(3):257–277

    Article  Google Scholar 

  • Yang S, Lu Y, Gupta S, Cao Y, Zhang R (2012) Mobile payment services adoption across time: an empirical study of the effects of behavioral beliefs, social influences, and personal traits. Comput Hum Behav 28(1):129–142

    Article  Google Scholar 

  • Yang W, Hu J, Yang J, Wang S, Shu L (2013) Biometrics for securing mobile payments: Benefits, challenges and solutions. In 6th IEEE International Congress on. Image and Signal Processing (CISP’2013), Vol. 3, pp 1699-1704, 16- 18 December 2013, Hangzhou, China,

  • Yang W, Zhang Y, Li J, Liu H, Wang Q, Zhang Y, Gu D (2017) Show me the money! finding flawed implementations of third-party in-app payment in android apps. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA

  • Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: a review. Symmetry 11(2):141

    Article  Google Scholar 

  • Yeh KH (2018) A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments. IEEE Syst J 12(2):2027–2038

    Article  Google Scholar 

  • Yeh TC, Peng JR, Wang SS, Hsu JP (2012) Securing bluetooth communications. IJ. Netw Secur 14(4):229–23

    Google Scholar 

  • Yıldırım N, Varol A (2014) Mobile biometric security systems for today and future. Proceeding Book, page 86

  • Yohan A, Lo NW, Randy V, Chen SJ, Hsu MY (2016) A novel authentication protocol for micropayment with wearable devices. In ACM Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, page 18, January 04 - 06, 2016, Danang, VietNam

  • Yohan A, Lo NW, Winata D (2018) An indoor positioning-based mobile payment system using bluetooth low energy technology. Sensors 18(4):974

    Article  Google Scholar 

  • Yomas J, Kiran NC (2019) An effective hardware-based bidirectional security aware mpayment system by using biometric authentication. In Computer Science On-line Conference, pp 99-108

  • Yue W (2015) Semopias: A novel secure and efficient mutual open PKI identity authentication scheme for mobile commerce. In The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems, pp 373-380, July 14-15 2015, Hohhot, China

  • Zhanga A, Yue X, Kong Y (2011) Exploring culture factors affecting the adoption of mobile payment. In Tenth IEEE International Conference on Mobile Business (ICMB), pp 263-267, June 20-21 2011, Como, Italy

  • Zhao H, Muftic S (2011a) The concept of secure mobile wallet. IEEE World Congress on Internet Security (WorldCIS) 54–58

  • Zhao H, Muftic S (2011b) Design and implementation of a mobile transactions client system: Secure UICC mobile wallet. Int J Inf Secur Res 1(3):113–120

    Google Scholar 

  • Zheng X, Chen D (2003) Study of mobile payments system. IEEE International Conference On E-Commerce (CEC’2003), pp 24–27

  • Zheng X, Yang L, Ma J, Shi G, Meng D (2016) Trustpay: Trusted mobile payment on security enhanced arm trustzone platforms. In 2016 IEEE Symposium on Computers and Communication (ISCC), pp 456–462

  • Zhou T (2011) The effect of initial trust on user adoption of mobile payment. Inf Dev 27(4):290–300

    Article  Google Scholar 

  • Zhou T (2014) An empirical examination of initial trust in mobile payment. Wirel Personal Commun 77(2):1519–1531

    Article  Google Scholar 

  • Zhou T, Lu Y, Wang B (2010) Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Hum Behav 26(4):760–767

    Article  Google Scholar 

  • Zhu X, Hou Z, Hu D, Zhang J (2016) Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority. In 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS’2016), pp 452–465, 16–18 November 2016, China

  • Zhu Y et al (2010) A new architecture for secure two-party mobile payment transactions. Dissertation, Lethbridge, Alta.: University of Lethbridge, c2010

  • Zhu Y, Rice JE (2009) A lightweight architecture for secure two-party mobile payment. In International Conference on. Computational Science and Engineering (CSE’09), Vol. 2, pp 326–333, Vancouver. BC, Canada

  • Zmijewska A, Lawrence E (2005) Reshaping the framework for analysing success of mobile payment solutions. Proceedings of the IADIS International Conference on E-commerce, Porto, Portugal

  • Zope SR, Limkar M (2012) RFID based bill generation and payment through mobile. Int J Comput Sci Netw Secur (IJCSNS), Citeseer, 1(3)

  • Zou J, Zhang C, Dong C, Fan C, Wen Z (2010) Mobile payment based on RFID-sim card. IEEE 10th International Conference onComputer and Information Technology (CIT), June 29-July 01 2010. Bradford, United Kingdom, pp 2052–2054

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sriramulu Bojjagani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bojjagani, S., Sastry, V.N., Chen, CM. et al. Systematic survey of mobile payments, protocols, and security infrastructure. J Ambient Intell Human Comput 14, 609–654 (2023). https://doi.org/10.1007/s12652-021-03316-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03316-4

Keywords

Navigation