Systematic survey of mobile payments, protocols, and security infrastructure


Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and online shopping, among other applications. Mobile payments are playing a vital role in the fast growth of online markets and are revolutionizing the supply chain of businesses and industries. Mobile payments are becoming dominant compared to conventional off-line mode payment channels and online e-channels such as ATM, e-cheque, and e-card payments. The success of e-business depends on several factors, including the type of mobile payment channel used, the associated security infrastructure, the stakeholders involved, and the m-business models adopted. In this paper, we present a systematic literature review (SLR) of mobile payments and characterize the state-of-the-art research conducted in this area, covering articles published during the past two decades, from 2000 to 2020. Following the SLR process, we examined over 350 research papers with a comprehensive and detailed inspection of the mobile payment domain’s literature. Based on the analysis, we present the trends, patterns, new technologies, innovations, gaps in the existing literature, and critical challenges. The recommendations given will help identify the primary areas requiring advancement in future research on mobile payment systems.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18


  1. 1.

  2. 2.


  1. Abedi L, Nematbakhsh M, Abdolmaleki A (2012) A model for context aware mobile payment. J Theor Appl Electron Commer Res 7(3):1–10

    Article  Google Scholar 

  2. Aboud SJ (2014) Analysis of offline E-cash schemes. Int J Adv Res 2(8):406–410

    Google Scholar 

  3. Abughazalah S, Markantonakis K, Mayes K (2014) Secure mobile payment on NFC-enabled mobile phones formally analysed using CasperFDR. IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp 422–431, 24–26 Sept 2014, Beijing, China

  4. Adesuyi FA, Oluwafemi O, Oludare AI, Victor AN, Rick AV (2013) Secure authentication for mobile banking using facial recognition. IOSR-JCE J Comput Eng 10(3):51–59

    Article  Google Scholar 

  5. Agarwal S, Khapra M, Menezes B. Uchat N (2007) Security issues in mobile payment systems. In: Proceedings of the 5th International Conference on E-Governance (ICEG’2007), pp 142–152, 28–30 Dec 2007, Hyderabad, India

  6. Aghili SF, Mala H (2019) Security analysis of an ultra–lightweight RFID authentication protocol for m–commerce. Int J Commun Syst 32(3):e3837

  7. Agoyi M, Seral D (2010) SMS security: an asymmetric encryption approach. IEEE 6th International Conference on Wireless and Mobile Communications (ICWMC’2010), pp 448–452, 20–25 Sept 2010, Valencia, Spain

  8. Ahamad SS, Sastry VN, Udgata SK (2012) A secure mobile wallet framework with formal verification. Int J Adv Pervasive Ubiquitous Comput (IJAPUC) IGI Global 4(2):1–15

    Article  Google Scholar 

  9. Ahamad SS, Sastry VN, Udgata SK (2012a) Enhanced mobile SET protocol with formal verification. Third International Conference on Computer and Communication Technology (ICCCT), pp 288–293, 23–25 Nov 2012, Allahabad, India

  10. Ahamad SS, Udgata SK, Sastry VN (2012b) A new mobile payment system with formal verification. Int J Internet Technol Secur Trans (IJITST) 4(1):71–103

    Article  Google Scholar 

  11. Ahamad SS, Sastry VN, Nair M (2013) A biometric based secure mobile payment framework. 4th International Conference on Computer and Communication Technology (ICCCT), pp 239–246, 20–22 Sept 2013, Allahabad, India

  12. Ahamad SS, Sastry VN, Udgata SK (2014) Secure mobile payment framework based on UICC with formal verification. Int J Comput Scie Eng (IJCSE), Inderscience Publishers Ltd, 9(4):355–370

  13. Ahamad SS, Al-Shourbaji I, Al-Janabi S (2016) A secure NFC mobile payment protocol based on biometrics with formal verification. Int J Internet Technol Secur Trans (IJITST) 6(2):103–132

    Article  Google Scholar 

  14. Ahamad SS, Sastry VN, Udgata SK (2017) A secure and optimized proximity mobile payment framework with formal verification. In: Mobile commerce: concepts, methodologies, tools, and applications, vol 6, pp 161–189

  15. Ahamad SS, Pathan AK (2019) Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adapt Syst Model (Springer) 7(1):1–18

    Article  Google Scholar 

  16. Ahmed R, Dharaskar RV (2009) Mobile forensics: an introduction from Indian law enforcement perspective. International Conference on Information Systems, Technology and Management (ICISTM’2009), CCIS (Springer), Vol. 31, pp 173–184, 12–13 Mar 2009, Ghaziabad, India

  17. Akter S, Chellappan S, Chakraborty T, Khan TA, Rahman A, Al I, Alim ABM (2020) Man-in-the-middle attack on contactless payment over NFC communications: design. Implementation, Experiments and Detection, IEEE Transactions on Dependable and Secure Computing

  18. Albasheer MO, Bashier EBM (2013) Enhanced model for PKI certificate validation in the mobile banking. International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp 470–476, 26–28 Aug 2013, Khartoum, Sudan

  19. Alexiou N, Basagiannis S, Petridou S (2014) Security analysis of NFC relay attacks using probabilistic model checking. Int Wirel Commun Mobile Comput Conf (IWCMC), pp 524–529, 4–8 Aug 2014, Nicosia, Cyprus

  20. Alexiou N, Basagiannis S, Petridou S (2016) Formal security analysis of near field communication using model checking. Comput Secur (Elsevier) 60:1–14

    Article  Google Scholar 

  21. Alharbi MH, Alhazmi OH (2019) Prototype: User authentication scheme for IoT using NFC. International Conference on Computer and Information Sciences (ICCIS), pp 1–5, 3–4 April 2019, Sakaka, Saudi Arabia

  22. Aliero MS, Ghani I, Qureshi KN, Rohani MF (2020) An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Hum Comput (JIHC) 11(1):249–266

    Article  Google Scholar 

  23. Aljohani A (2014) Mobile payments with instant settlements. Eighth International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST’2014), pp 181–185, 10–12 Sept 2014, Oxford, UK

  24. Alimi V, Pasquet M (2009) Post-distribution provisioning and personalization of a payment application on a UICC-based Secure Element. International Conference on Availability, Reliability and Security (ARES’2009), pp 701–705, 16–19 March 2009, Fukuoka, Japan

  25. Almuairfi S, Veeraraghavan P, Chilamkurti N, Doo-Soon P (2014) Anonymous proximity mobile payment (APMP). Peer-to-Peer Net Appl (Springer) 7(4):620–627

    Article  Google Scholar 

  26. Alqahtani M (2015) A framework of mobile transaction use: the user’s perspective. Dissertation, University of East Anglia

  27. Alshehri A, Briffa JA, Schneider S, Wesemeyer S (2013) Formal security analysis of NFC M-coupon protocols using Casper/FDR. 5th International Workshop on Near Field Communication (NFC), pp 1–6, 2013, Zurich, Switzerland

  28. Anand RS, Madhavan CEV (2000) An online, transferable E-Cash payment system. International Conference on Cryptology in India (INDOCRYPT 2000), pp 93–103, Calcutta, India

  29. Antovski L, Gusev M (2003) M-payments. Proceedings of the 25th International Conference on Information Technology Interfaces (ITI’2003), pp 95–100

  30. Anuar NB, Kuen LN, Zakaria O, Gani A, Wahab AWA (2008) GSM mobile SMS/MMS using public key infrastructure: m-PKI. WSEAS Trans Comput 7(8):1219–1229

    Google Scholar 

  31. Apanasevic T, Markendahl J, Arvidsson N (2016) Stakeholders’ expectations of mobile payment in retail: lessons from Sweden. Int J Bank Market 34(1): 37–61

  32. Ashok A, Gajera S, Chakraborty J, Arolker P, Rai N (2012) M-wallet: an SMS based payment system. Int J Eng Res Appl(IJERA), ISSN: 2248–9622

  33. Askoxylakis IG, Pramateftakis M, Kastanis DD, Traganitis AP (2007) Integration of a secure mobile payment system in a GSM/UMTS SIM smart card. In: Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS’07), pp 40–50

  34. Au YA, Kauffman RJ (2008) The economics of mobile payments: understanding stakeholder issues for an emerging financial technology application. Electron Commer Res Appl (ECRA, Elsevier) 7(2):141–164

    Article  Google Scholar 

  35. Augsburg C, Hedman J (2014) Value added services and adoption of mobile payments. In: Proceedings of the sixteenth international conference on electronic commerce (ICEC’14), Philadelphia, PA, USA, pp 27–32

  36. Aziza H (2010) NFC technology in mobile phone next-generation services. Second International Workshop on Near Field Communication, pp 21–26, Monaco, Monaco

  37. Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: A new anonymous mobile payment system implemented by elliptic curve cryptography. In: Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering (CSIE’09), Vol.3, pp 286–290

  38. Balan R.K, Ramasubbu N, Prakobphol K, Christin N, Hong J (2009) mFerio: the design and evaluation of a peer-to-peer mobile payment system. In: ACM Proceedings of the 7th International Conference on Mobile Systems, Applications and Services (MobiSys’09), pp 291–304,

  39. Bamasak O (2011) Exploring consumers acceptance of mobile payments–an empirical study. Int J Inf Technol Commun Converg (IJITCC), 1(2), pp 173–185

  40. Bangdao C, Roscoe AW (2011) Mobile electronic identity: securing payment on mobile phones. In: IFIP International Workshop on Information Security Theory and Practices (WISTP’2011), pp 22–37, 30 June–2 (July 2014) Heraklion. Crete, Greece

  41. Baseri Y, Takhtaei B, Mohajeri J (2013) Secure untraceable off-line electronic cash system. Scientia Iranica (Elsevier), 20(3), pp 637–646,

  42. Binga P, Caia FU, Xiongb FU (2008) Efficient mobile payment system based on ECC [J]. Application Research of Computers, Vol.9

  43. Bojjagani S, Sastry VN (2017) A secure end-to-end SMS-based mobile banking protocol. Int J Commun Syst (IJCS) Wiley 30(15):

    Article  Google Scholar 

  44. Bojjagani S, Sastry VN (2019) A secure end-to-end proximity NFC-based mobile payment protocol. Computer Standards & Interfaces (CSI) Elsevier, Vol.66, pp 103348,

  45. Bojjagani S, Brabin DRD, Rao PVV (2020) PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification. Proc Comput Sci (Elsevier) 171:1110–1119

    Article  Google Scholar 

  46. Bojjagani S, Reddy BR, Sandhya M, Vemula DR (2020a) CybSecMLC: A Comparative Analysis on Cyber Security Intrusion Detection Using Machine Learning Classifiers. Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA’2020), pp 232–245, 14–17 Oct 2020, Chennai, India

  47. Bojjagani S, Sastry VN (2015a) Stamba: Security testing for Android mobile banking apps. In: Proceedings of the second international symposium on signal processing and intelligent recognition systems (SIRS’15), Trivandrum, India, pp. 671–683.

  48. Bojjagani S, Sastry VN (2015b) SSMBP: A secure SMS-based mobile banking protocol with formal verification. In: IEEE 11th international conference on wireless and mobile computing, networking and communications (WiMob), Abu Dhabi, UAE, pp 252–259.

  49. Bojjagani S, Sastry VN (2017) VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps. In: IEEE 3rd international conference on collaboration and internet computing (CIC), San Jose. California, USA, pp 77–86.

  50. Borzekowski R, Elizabeth KK, Shaista A (2008) Consumers’ use of debit cards: patterns, preferences, and price response. Journal of money, credit and banking (Wiley Online Library), 40(1):149–172

  51. Bouazzouni MA, Conchon E, Peyrard F (2018) Trusted mobile computing: an overview of existing solutions. Fut Gen Comput Syst (Elsevier) 80:596–612

    Article  Google Scholar 

  52. Bravo J, Hervás R, Gallego R, Casero G, Vergara M, Carmona T, Fuentes C, Nava SW, Chavira G, Villarreal V (2008) Enabling NFC technology to support activities in an Alzheimer’s day center. In: ACM Proceedings of the 1st International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’08), pp 1–5, 16–18 July 2008, Athens, Greece

  53. Brereton P, Kitchenham BA, Budgen D, Turner M, Khalil M (2007) Lessons from applying the systematic literature review process within the software engineering domain. J Syst Softw (Elsevier) 80(4):571–583

    Article  Google Scholar 

  54. Brlek S, Hamadou S, Mullins J (2006) A flaw in the electronic commerce protocol SET. Inf Process Lett (Elsevier) 97(3):104–108

    MathSciNet  MATH  Article  Google Scholar 

  55. Bujang SDA, Selamat A (2009) Verification of mobile SMS application with model checking agent. International Conference on Information and Multimedia Technology (ICIMT’2009), pp 361–365, 16–18 Dec 2009, Jeju, Korea (South)

  56. Cappiello I, Puglia S, Vitaletti A (2009) Design and initial evaluation of a ubiquitous touch-based remote grocery shopping process. IEEE First International Workshop on Near Field Communication (NFC’09), pp 9–14, 24–24 Feb 2009, Hagenberg, Austria

  57. Carr M (2007) Mobile payment systems and services: an introduction. Mobile Payment Forum 1(12):1–12

    Google Scholar 

  58. Carton F, Hedman J, Dennehy D, Damsgaard J, Tan KT, McCarthy JB (2012) Developing a framework for mobile payments integration. Electron J Inf Syst Eval 15(1):14–25

    Google Scholar 

  59. Chaix L, Torre D (2011) Four models for mobile payments. University Nice Sophia-Antipolis, JEL Classification E 42:1–25

  60. Chang YS, Chang CL, Hung YS, Tsai CT (2010) NCASH: NFC phone-enabled personalized context awareness smart-home environment. An International Journal Cybernetics and System, (Taylor & Francis) 41(2), pp 123–145

  61. Chavira G, Nava SW, Hervás R, Villarreal V, Bravo J, Martín S, Castro M (2008) Services through NFC technology in AmI Environment. In: ACM Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services (iiWAS’2008), pp 666-669, 24-26 November 2008, Linz, Austria

  62. Chen JJ, Adams C (2004) Short-range wireless technologies with mobile payments systems. In: ACM proceedings of the 6th international conference on electronic commerce (ICEC’04), pp 649–656

  63. Lei-da C (2008) A model of consumer acceptance of mobile payment. Int J Mobile Commun (Inderscience Publishers) 6(1):32–52

    Article  Google Scholar 

  64. Chen Y, Chou J-S, Sun H-M, Cho M-H (2011) A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron Commerce Res Appl 10(6):673–682

    Article  Google Scholar 

  65. Chen Y, Chou J-S (2014) Cryptanalysis on “Secure untraceable off-line electronic cash system.” IACR Cryptol. ePrint Arch 2014:63

  66. Chen Y, Chou J-S (2015) On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking.” IJ Network Security 17(6):708–711

  67. Chen Y, Xu W, Li Peng, Zhang H (2019) Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT. IEEE Access 7:15210–15221

    Article  Google Scholar 

  68. Cheng HC, Liao WW, Chi TY, Wei SY (2011) A secure and practical key management mechanism for nfc read-write mode. In: 13th IEEE International Conference On Advanced Communication Technology (ICACT), pp 1095-1011, 13-16 Feb 2011, Gangwon-Do, Korea (South)

  69. Cheng Y, Huang TY (2013) High speed rail passengers’ mobile ticketing adoption. Transport Res Part C Emerg Technol 30:143–160

    Article  Google Scholar 

  70. Cheong CP (2010) A simple and secure credit card-based payment system. Electron Serv Concepts Methodol Tools Appl (IGI Global), pp 834–842

    Google Scholar 

  71. Chin AG, Harris MA, Brookshire R (2020) An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework. Information Systems Frontiers (Springer) 1–19

  72. Ching, YC, Kreft H (2008) Faircash: Concepts and framework. In: IEEE Second International Conference On Next Generation Mobile Applications, Services and Technologies, (NGMAST’08), pp 269–274, 16–19 (September 2008) Washington. DC, USA

  73. Chong MK (2006) Security of mobile banking: Secure SMS banking. Dissertation, University of Cape Town, South Africa

  74. Chow YW, Susilo W, Yang G, Au MH, Wang C (2016) Authentication and transaction verification using qr codes with a mobile device. In: Proceedings of the 9th International Conference On Security, Privacy, and Anonymity in Computation, Communication, and Storage, (SpaCCS’2016), pp 437-451, 16-18 November 2016, Zhangjiajie, China

  75. Clarke R (2008) A risk assessment framework for mobile payments. Bled 2008 Proceedings, (Accessed 26 Aug 2020)

  76. Conde-Lagoa D, Costa-Montenegro E, González-Castaño, Francisco J, Gil-Castiñeira F (2010) Secure eTickets Based on QR-Codes with User-Encrypted Content. In: IEEE International Conference On Consumer Electronics (ICCE’2010), 11-13 Jan 2010, pp 257-258

  77. Čović Z, Viktor Ü, Simon J, Dobrilović D, Stojanov Ž (2016) Usage of QR codes in web based system for the electronic market research. IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY’2016), pp 187-192

  78. Dahlberg T, Mallat N, Öörni A (2003) Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions: Tentative evidence. Stockholm Mobil Roundtable 22:23

    Google Scholar 

  79. Dahlberg T, Huurros M, Ainamo A (2008) Lost Opportunity Why Has Dominant Design Failed to Emerge for the Mobile Payment Services Market in Finland?. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, (HICSS’2008), pp. 83–83, 07–10 (January 2008) Waikoloa. HI, USA

  80. Dahlberg T, Mallat N, Ondrus J, Zmijewska A (2008a) Past, present and future of mobile payments research: a literature review. Electron Commer Res Appl (Elsevier) 7(2):165–181

    Article  Google Scholar 

  81. Dahlberg T, Guo J, Ondrus J (2015) A critical review of mobile payment research. Electron Commer Res Appl 14(5):265–284

    Article  Google Scholar 

  82. Dai X, Ayoade O, Grundy J (2006) Off-line micro-payment protocol for multiple vendors in mobile commerce. In: Seventh IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’06), pp 197-202, 4-7 December 2006, Taipei, Taiwan

  83. Dai W, Zhou S, Luo G, Chen Z, Xie L (2011) Analyze on mobile payment based on RFID. Proc Environ Sci (Elsevier) 10:950–955

    Article  Google Scholar 

  84. Dai W, Cai X, Wu H, Zhao W, Li X (2011a) An integrated mobile phone payment system based on 3g network. J Netw 6(9):1329–1336

    Article  Google Scholar 

  85. Damsgaard J, Gao P (2004) A framework for analyzing mobile telecommunications market development. Mobile Inf Syst 169–182

  86. Das ML, Saxena A, Gulati VP (2005) A security framework for mobile-to-mobile payment network. In: IEEE International Conference on Personal Wireless Communications (ICPWC’2005), pp 420-423, 23-25 January 2005, New Delhi, India

  87. Daştan İ, Gürler C (2016) Factors affecting the adoption of mobile payment systems: An empirical analysis. EMAJ: Emerg Markets J 6(1):17–24

  88. Daza V, Di PR, Lombardi F, Signorini M (2014) FORCE: Fully off-line secure credits for mobile micro payments. 11th International Conference on Security and Cryptography (SECRYPT), pp 1-12

  89. Daza V, Di PR, Lombardi F, Signorini M (2015) FRoDO: Fraud resilient device for off-line micro-payments. IEEE Transactions on Dependable and Secure Computing 13(2):296–311

    Article  Google Scholar 

  90. De Reuver M, Verschuur E, Nikayin F, Cerpa N, Bouwman H (2015) Collective action for mobile payment platforms: A case study on collaboration issues between banks and telecom operators. Electron Commer Res Appl 14(5):331–344

    Article  Google Scholar 

  91. De Santis A, Castiglione A, Cattaneo G, Cembalo M, Petagna F, Petrillo UF (2010) An extensible framework for efficient secure SMS., IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS’2010), pp 843-850

  92. Dennehy D, Sammon D (2015) Trends in mobile payments research: a literature review. J Innov Manag 3(1):49–61

    Article  Google Scholar 

  93. Di Pietro R, Me G, Strangio MA (2005) A two-factor mobile authentication scheme for secure financial transactions. In: IEEE International Conference on Mobile Business (ICMB’05), pp 28-34, 11-13 July 2005, Sydney, Australia

  94. Dominikus S, Aigner M (2007) mCoupons: An application for near field communication (NFC). In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Vol.2, pp 421-428, 21-23 May 2007, Niagara Falls, Canada

  95. Duangphasuk S, Warasart M, Kungpisdan S (2011) Design and accountability analysis of a secure SMS-based mobile payment protocol. In:The 8th Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand-Conference, pp 442-445

  96. Dwivedi R, Dey S, Sharma MA, Goel A (2020) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Hum Comput (Springer) 11:1495–1509

    Article  Google Scholar 

  97. Eisenmann TR, Parker G, Van Alstyne M (2009) Opening platforms: how, when and why? Platforms, markets and innovation 6:131–162

    Google Scholar 

  98. Elkhodr M, Shahrestani S, Kourouche K (2012) A proposal to improve the security of mobile banking applications. 10th IEEE International Conference on ICT and Knowledge Engineering, pp 260-265, 21-23 Nov 2012, Bangkok, Thailand

  99. Ertaul L, Lu W (2005) ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). International Conference on Research in Networking 102–113

  100. Eslami Z, Talebi M (2011) A new untraceable off-line electronic cash system. Electron Commer Res Appl 10(1):59–66

    Article  Google Scholar 

  101. Esmaeili L, Borhani-Fard Z, Arasteh MA (2012) A survey on mobile payment systems security. Research Journal of Applied Sciences, Engineering and Technology 4(20):4043–4050

    Google Scholar 

  102. Fan CI, Sun WZ, Hau HT (2014) Date attachable offline electronic cash scheme. The Scientific World Journal (Hindawi), Vol. 2014, Article ID 216973, pp 1-19,

  103. Fan Y, Liu S, Tan G, Qiao F (2018) Fine-grained access control based on trusted execution environment. Future Generation Computer Systems (Elsevier), Vol.109, pp 551-561,

  104. Ferreira MC, Nóvoa H, Dias TG et al (2014) A proposal for a public transport ticketing solution based on customers’ mobile devices. Procedia-Social and Behavioral Sciences 111:232–241

    Article  Google Scholar 

  105. Firoz MH, Ahmed Z (2017) Defensive protocol to ensure safe Mobile Financial Transaction in current context. In: IEEE Third Asian Conference on Defence Technology (ACDT), pp 54-58, 18-20 Jan 2017, Phuket, Thailand

  106. Fong S, Lai E (2005) Mobile mini-payment scheme using SMS-credit. International Conference on Computational Science and Its Applications (ICCSA’2005), pp 1106-1114,

  107. Fourati A, Ayed HB, Kamoun F, Benzekri A (2002) A set based approach to secure the payment in mobile commerce. In: Proceedings LCN?: 27th Annual IEEE Conference on Local Computer Networks, pp 136–137, 6–8, (Nov 2002) Tampa. Florida, USA

  108. Francis L, Hancke G, Mayes K, Markantonakis K (2010) Practical NFC peer-to-peer relay attack using mobile phones. In: Springer Proceedings of International Workshop On. Radio Frequency Identification: Security and Privacy Issues (RFIDSec’2010), pp 35-49, 8-9 Jun 2010, Istanbul, Turkey

  109. Francisco LC, Francisco ML, Juan SF (2015) Payment systems in new electronic environments: consumer behavior in payment systems via SMS. International Journal of Information Technology & Decision Making 14(02):421–449

    Article  Google Scholar 

  110. Fressancourt A, Hérault C, Ptak E (2009) NFCSocial: Social networking in mobility through IMS and NFC. In. IEEE International Workshop on Near Field Communication (NFC’09), pp 24-29, 24-24 Feb 2009, Hagenberg, Austria

  111. Frimpong K, Al-Shuridah O, Wilson A, Sarpong FAA (2017) Effect of inherent innovativeness and consumer readiness on attitudes to mobile banking. Journal of Financial Services Marketing 22(4):187–201

    Article  Google Scholar 

  112. Fu Y, Fu Q (2009) Scheme and secure protocol of mobile payment based on RFID. 3rd IEEE International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID’2009), pp 631-634, 20-22 August 2009, Hong Kong, China

  113. Fun TS, Beng LY, Likoh J, Rosla R (2008) A lightweight and private mobile payment protocol by using mobile network operator. In: IEEE International Conference on Computer and Communication Engineering (ICCCE’2008), pp 162-166, 13-15 May 2008, Kuala Lumpur, Malaysia

  114. Fun TS, Beng LY, Roslan R, Habeeb HS (2008a) Privacy in new mobile payment protocol. Proceedings of World Academy of Science, Engineering and Technology 2(11):3713–3717

    Google Scholar 

  115. Fun TS, Beng LY, Razali MN (2013) Review of mobile macro-payments schemes. Journal of Advances in Computer Networks 1(4):323–327

    Google Scholar 

  116. Gackle B, Zuo Y (2014) A new approach for credit extended mobile phone payment. International Journal of Business Information Systems 15(4):434–449

    Article  Google Scholar 

  117. Gannamaneni A, Ondrus J, Lyytinen K (2015) A post-failure analysis of mobile payment platforms. In: 48th IEEE Hawaii International Conference on System Sciences (HICSS), pp 1159-1168, 5-8 Jan 2015, HI, USA

  118. Gao, J, Edunuru K, Cai J, Shim SPD (2005) P2P-Paid: A peer-to-peer wireless payment system. In: The Second IEEE International Workshop on Mobile Commerce and Services (WMCS’05), pp 102-111, 19 July 2005, Munich, Germany

  119. Gao L, Waechter KA (2017) Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Information Systems Frontiers (Springer) 19(3):525–548

    Article  Google Scholar 

  120. Garner P, Edwards R, Coulton P (2006) Card-based macropayment for mobile phones, IEEE International Conference on. Mobile Business ( ICMB’06), pp 4–4, 26-27 June 2006, Copenhagen, Denmark

  121. Garrido PC, Miraz GM, Ruiz IL, Gómez-Nieto MÁ (2010) A model for the development of NFC context-awareness applications on Internet of Things. In: Second IEEE International Workshop On. Near Field Communication (NFC), pp 9-14, 20-20 April 2010, Monaco, Monaco

  122. Gaur A, Ondrus J (2012 The role of banks in the mobile payment ecosystem: a strategic asset perspective. In: ACM Proceedings of the 14th Annual International Conference on Electronic Commerce (ICEC’12), pp 171-177, 6-8 August 2012, Singapore

  123. Gerpott TJ, Meinert P (2016) Correlates of using the billing system of a mobile network operator to pay for digital goods and services. Information Systems Frontiers (Springer) 18(6):1265–1283

    Article  Google Scholar 

  124. Ghezzi A, Renga F, Balocco R, Pescetto P (2010) Mobile Payment Applications: offer state of the art in the Italian market. info 12(5), pp 3-22

  125. Ghiron SL, Sposato S, Medaglia CM, Moroni A (2009) NFC ticketing: A prototype and usability test of an NFC-based virtual ticketing application. In: First IEEE International Workshop on Near Field Communication (NFC’09), pp 45-50, 24-24 Feb 2009, Hagenberg, Austria

  126. Godbole RM, Pais AR (2008) Secure and efficient protocol for mobile payments. In: Proceedings of the 10th international conference on Electronic commerce (ICEC’08:), pp 1-10,

  127. Goeke L, Pousttchi K (2010) A scenario-based analysis of mobile payment acceptance. In: Ninth IEEE International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), pp 371-378, 13-15 June 2010, Athens, Greece

  128. Gogolin G, Gogolin E (2017) The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications. International Journal of Handheld Computing Research (IJHCR) 8(1):42–52

    Article  Google Scholar 

  129. Gordon M, Sankaranarayanan S (2010) Biometric security mechanism in mobile paymentts. In: Seventh IEEE International Conference on Wireless And Optical Communications Networks (WOCN), pp 1-6, 06-08 Sep 2010, Colombo, Sri Lanka

  130. Gu JC, Lee SC, Suh YH (2009) Determinants of behavioral intention to mobile banking. Expert Systems with Applications (Elsevier) 36(9):11605–11616

    Article  Google Scholar 

  131. Guo W (2008) Research on mobile commerce based on RFID. IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE/SOLI’2008), Vol.1, pp 853-857, 12-15 Oct 2008, Beijing, China

  132. Guo W (2008a) Design of architecture for mobile payments system. In: IEEE Conference on Control and Decision (CCDC’2008), pp 1732–1735, 2–4, (July 2008) Yantai. Shandong, China

  133. Guo J, Nikou S, Bouwman H (2013) Analyzing the business model for mobile payment from banks’ perspective: An empirical study. In: 24th European Regional Conference of the International Telecommunication Society, 20-23 Oct 2013, Florence, Italy

  134. Guo J, Nikou S, Bouwman H (2015) Business model for mobile payment in China. International Journal of Systems and Service-Oriented Engineering (IJSSOE) 5(2):20–43

    Article  Google Scholar 

  135. Guo J, Bouwman H (2016) An analytical framework for an m-payment ecosystem: A merchants perspective. Telecommunications Policy 40(2):147–167

    Article  Google Scholar 

  136. Gupta P (2016) End to end ussd system. TATA Tele Service Limited, INDIA 53(7):54

    MathSciNet  Google Scholar 

  137. Gupta S, Johari R (2011) A new framework for credit card transactions involving mutual authentication between cardholder and merchant. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT’2011), pp 22–26, 3–5 (June 2011) Katra. Jammu, India

  138. Haddad E, King B (2007) A simple secure m-commerce protocol ssmcp. Int J Comput Sci Netw Secur (IJCSNS) 7(3):220–229

    Google Scholar 

  139. Han T, Ding L (2017) Design and implementation of Bluetooth beacon in mobile payment system. In: AIP Conference Proceedings, Vol. 1864, pp 020019

  140. Harb H, Farahat H, Ezz M (2008) Securesmspay: secure sms mobile payment model. In: 2nd IEEE International Conference on Anti-counterfeiting, Security and Identification (ASID’2008), pp 11-17

  141. Hardy R, Rukzio E, Wagner M, Paolucci M (2009) Exploring expressive nfc-based mobile phone interaction with large dynamic displays. First IEEE International Workshop on Near Field Communication (NFC’09), pp 36-41, 24-24 Feb 2009, Hagenberg, Austria,

  142. Hassinen M (2005) SafeSMS-end-to-end encryption for SMS. Proceedings of the 8th International Conference on Telecommunications, (ConTEL’2005), Vol.2, pp 359-365

  143. Hassinen M, Hyppönen K, Haataja K (2006) An open, PKI-based mobile payment system. International Conference on Emerging trends in information and communication security 86–100

  144. Hassinen M, Hyppönen K, Trichina E (2008) Utilizing national public-key infrastructure in mobile payment systems. Electron Commer Res Appl 7(2):214–231

    Article  Google Scholar 

  145. Hedman J, Henningsson S (2012) Competition and collaboration shaping the digital payment infrastructure. In Proceedings of the 14th ACM Annual International Conference on. Electronic Commerce (ICEC’12), 07-08 August 2012, pp 178-185, Singapore

  146. Hedman J, Henningsson S (2015) The new normal: Market cooperation in the mobile payments ecosystem. Electron Commer Res Appl 14(5):305–318

    Article  Google Scholar 

  147. Herzberg A (2003) Payments and banking with mobile personal devices. Communications of the ACM 46(5):53–58

    Article  Google Scholar 

  148. Hu L, Chi L, Li H, Yuan W, Sun Y, Chu J (2012) The classic security application in m2m: the authentication scheme of mobile payment. KSII Transactions on Internet & Information Systems, 6(1)

  149. Huang P, Boucouvalas AC (2006) Future personal “e-payment”: Irfm. IEEE Wireless Communications 13(1):60–66

  150. Huang X, Bao J, Dai X, Singh E, Huang W, Huang C (2016) M&e-netpay: A micropayment system for mobile and electronic commerce. Symmetry 8(8):74

    MathSciNet  Article  Google Scholar 

  151. Humbani M, Wiese M (2018) A cashless society for all: determining consumers’ readiness to adopt mobile payment services. Journal of African Business 19(3):409–429

    Article  Google Scholar 

  152. Hwang JJ, Yeh TC, Li JB (2003) Securing on-line credit card payments without disclosing privacy information. Computer Standards & Interfaces 25(2):119–129

    Article  Google Scholar 

  153. Hwang RJ, Shiau SH, Jan DF (2007) A new mobile payment scheme for roaming services. Electron Commer Res Appl 6(2):184–191

    Article  Google Scholar 

  154. Isaac JT, Sherali Z (2014) Secure mobile payment systems. IT Professional 16(3):36–43

    Article  Google Scholar 

  155. Isaac JT, Zeadally S, Cámara JS (2012) A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electronic Commerce Research 12(1):97–123

    Article  Google Scholar 

  156. Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL (2013a) Anonymous and fair micropayment scheme with protection against coupon theft. International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), 4(2), pp 54-71

  157. Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL, Huguet-Rotger L (2012) Micropayment scheme implementation on the android platform with performance evaluation. In Proceedings of the 10th ACM International Conference on. Advances in Mobile Computing & Multimedia, pp 64-73, 03-05 December 2012, Bali, Indonesia

  158. Isern-Deyà AP, Payeras-Capella MM, Mut-Puigserver M, Ferrer-Gomila JL, Huguet-Rotger L (2013b) Micropayment proposal with formal verification using coloured petri nets and performance analysis on the android platform. International Journal of Business Intelligence and Data Mining 8(1):74–104

    MATH  Article  Google Scholar 

  159. Islam SH, Amin R, Biswas G, Obaidat MS, Khan MK (2016) Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering 41(8):3163–3176

    MathSciNet  MATH  Article  Google Scholar 

  160. Ityala S, Sharma O, Honnavalli PB (2019 Transparent watermarking qr code authentication for mobile banking applications. In International Conference on Inventive Computation Technologies, pp 738-748

  161. Jain AK, Shanbhag D (2012) Addressing security and privacy risks in mobile applications. IT Professional 14(5):28–33

    Article  Google Scholar 

  162. Jatoth C, Gangadharan G, Buyya R (2017) Computational intelligence based qos-aware web service composition: a systematic literature review. IEEE Trans Serv Comput 10(3):475–492

    Article  Google Scholar 

  163. Jiang N, Liu X, Zhao J, Yang D (2009) A mobile micropayment protocol based on chaos. In Eighth IEEE International Conference onMobile Business (ICMB’2009), pp 284-289, 27-28 June 2009, Dalian, China

  164. Jiang N, Ri-jing Y, Zheng-kui L et al (2010) Mobile micropayment protocol based on chaotic dual hash chains. Journal of Jilin University (Engineering and Technology Edition) 2:055

    Google Scholar 

  165. Juang W-S (2010) Ro-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings. Journal of Systems and Software 83(4):638–645

    Article  Google Scholar 

  166. Kadhiwal S, Zulfiquar AUS (2007) Analysis of mobile payment security measures and different standards. Comput Fraud Secur 6:12–16

    Article  Google Scholar 

  167. Kang B, Du J, Han Y, Qian K (2020) A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service. Int J Netw Secur 22(6):945–953

    Google Scholar 

  168. Kanniainen L (2010) Alternatives for banks to offer secure mobile payments. Intl J Bank Market 28(5):433–444

    Article  Google Scholar 

  169. Kao DT (2009) The impact of transaction trust on consumers’ intentions to adopt m-commerce: A cross cultural investigation. CyberPsychology & Behavior 12(2):225–229

    Article  Google Scholar 

  170. Karnouskos S (2004) Mobile payment: a journey through existing procedures and standardization initiatives. IEEE Communications Surveys & Tutorials 6(4)

  171. Karpischek S, Michahelles F, Bereuter A, Fleisch E (2009) A maintenance system based on near & #xC;field communication. In Third IEEE International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST’09), pp 234–238, 15–18 (September 2009) Cardi. Wales, UK

  172. Karpischek S, Michahelles F, Resatsch F, Fleisch E (2009a) Mobile sales assistant-an nfc-based product information system for retailers. In First IEEE International Workshop on Near Field Communication, (NFC’09), pp 20-23, 24-24 .Feb 2009, Hagenberg, Austria

  173. Kashif M (2014) Secure SMS communication using encryption gateway and digital signature. In Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on, pp 1430-1434

  174. Kazan E, Damsgaard J (2013) A framework for analyzing digital payment as a multi-sided platform: A study of three european NFC solutions. pp 1-13

  175. Kefalakis N, Leontiadis N, Soldatos J, Gama K, Donsez D (2008) Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform. In ACM Proceedings of the ACM/IFIP/USENIX (Middleware’08), pp 66-69, 01-05 December 2008, Leuven, Belgium

  176. Kim S, Oh H (2001) An Atomic Micropayment System for a Mobile Computing Environment. IEICE Transactions on information and Systems 84(6):709–716

    Google Scholar 

  177. Kisore N.R, Sagi S (2015) A secure SMS protocol for implementing digital cash system. 4th International Conference On Advances in Computing, Communications and Informatics (ICACCI), pp 1883-1892, 10-13 August 2015, Kochi, India

  178. Kitchenham B (2004) Procedures for performing systematic reviews. Vol. 33, pp 1-26, Keele, UK, Keele University

  179. Kneissl F, Rottger R, Sandner U, Leimeister JM, Krcmar H (2009) All-i-touch as combination of nfc and lifestyle. In First IEEE International Workshop on Near Field Communication (NFC’09), pp 51-55, 24-24 Feb 2009, Hagenberg, Austria

  180. Köbler F, Koene P, Krcmar H, Altmann M, Leimeister JM (2010) LocaTag-An NFC-based system enhancing instant messaging tools with real-time user location. Second IEEE International Workshop on Near Field Communication (NFC), pp 57-61, 20-20 April 2010, Monaco, Monaco

  181. Kounelis I, Zhao H, Muftic S (2011) Secure middleware for mobile phones and uicc applications. In International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp 143-152, 22-24 June 2011, London, UK

  182. Kumar D, Ryu Y (2009) A brief introduction of biometrics and fingerprint payment technology. International Journal of advanced science and Technology 4:25–38

    Google Scholar 

  183. Kumar S, Rabara S (2010) An architectural design for secure mobile remote macro-payments. Journal of Next Generation Information Technology 1(2)

  184. Kungpisdan S, Srinivasan B, Le PD (2003) Lightweight mobile credit-card payment protocol. In International Conference on Cryptology in India, pp 295-308

  185. Kungpisdan S, Srinivasan B, Le PD (2004) A secure account-based mobile payment protocol. In IEEE International Conference on Information Technology: Coding and Computing, (ITCC’2004), pp 35-39, 5-7 April 2004, Vol. 1, pp:35-39, Las Vegas, NV, USA

  186. Kungpisdan S (2005) Modelling, design, and analysis of secure mobile payment systems. Dissertation, Monash University

  187. Kungpisdan S (2010a) Accountability of centralized payment systems: formal reasoning, protocol design and analysis. IETE Technical Review 27(5):351–364

    Article  Google Scholar 

  188. Kungpisdan S, Warasart M (2010b) SOMP: An SMS-based Operator-assisted Mobile Payment Protocol. IEEE Proceedings of the 1st International Computer Science and Engineering Conference (ICSEC’2010), pp 29-34, Chiangmai, Thailand

  189. Labrou Y, Agre J, Ji L, Molina J, Chen WI (2004) Wireless wallet. The First Annual International Conference on. Mobile and Ubiquitous Systems: Networking and Services, (MOBIQUITOUS’2004), pp 32–41, 22–26 (August 2004) Boston. MA, USA

  190. Lacmanović I, Radulović B, Lacmanović D (2010) Contactless payment systems based on RFID technology. Proceedings of the IEEE 33rd International Convention (MIPRO’2010), pp 1114-1119, 24-28 May 2010, Opatija, Croatia

  191. Lam KY, Chung SL, Gu M, Sun JG (2003) Lightweight security for mobile commerce transactions. Computer Communications 26(18):2052–2060

    Article  Google Scholar 

  192. Lee J, Cho CH, Jun MS (2011) Secure quick response-payment (qr-pay) system using mobile device. 13th IEEE International Conference on Advanced Communication Technology (ICACT), pp 1424-1427, 13-16 Feb 2011, Gangwon-Do, Korea (South)

  193. Lee JS, You HN, Cho CH, Jun MS (2012) A design secure qr-login user authentication protocol and assurance methods for the safety of critical data using smart device. The Journal of Korean Institute of Communications and Information Sciences 37(10):949–964

    Article  Google Scholar 

  194. Lee O (2004) Sound-based mobile payment system. In Proceedings of the IEEE International Conference on. Web Services, (ICWS-2004), pp 820–821, 6–9 (July 2004) San Diego. California, USA

  195. Leong CM, Tan KL, Puah CH, Chong SM (2020) Predicting mobile network operators users m-payment intention. European Business Review, Emerald Publishing Limited,

    Article  Google Scholar 

  196. Lerner T (2013) The Market. Mobile payment (Springer) 13–22

  197. Levisse A, Manuel N, Sjolund M (2008) Getting more from prepaid mobile services. McKinsey Quarterly

  198. Li J, Li J (2009) Model checking the set purchasing process protocol with spin. In 5th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom’09), pp 1-4, 24-26 September 2009, Beijing, China

  199. Li L, Tao L (2009) Security study of mobile business based on WPKI. In IEEE Eighth International Conference on. Mobile Business (ICMB’2009), pp 301-304, 27-28 June 2009, Dalian, China

  200. Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 35(2):188–195

    Article  Google Scholar 

  201. Li W, Xia Y, Lu L, Chen H, Zang B (2019) TEEv: virtualizing trusted execution environments on mobile platforms. In Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp 2-16

  202. Li Y, Zhang X (2004) A security-enhanced one-time payment scheme for credit card. Proceedings. 14th International Workshop on Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, pp 40-47

  203. Liébana-Cabanillas F, Higueras-Castillo E, Molinillo S, Montañez MR (2019) Assesing the role of risk and trust in consumers’ adoption of online payment systems. Int J Inf Syst oftw Eng Big Compan (IJISEBC) 5(2):99–113

    Google Scholar 

  204. Liébana-Cabanillas F, Ramos de Luna I, Montoro-Ríos FJ (2015) User behaviour in QR mobile payment system: the QR Payment Acceptance Model. Technology Analysis & Strategic Management 27(9):1031–1049

    Article  Google Scholar 

  205. Liébana-Cabanillas F, Sánchez-Fernández J, Muñoz-Leiva F (2014) Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Computers in Human Behavior 35:464–478

    Article  Google Scholar 

  206. Lin P, Chen HY, Fang Y, Jeng JY, Lu FS (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Transactions on Wireless Communications 7(7)

  207. Lisonek D, Drahanskỳ M (2008) SMS encryption for mobile communication. International Conference on Security Technology (SECTECH’08), pp 198-201

  208. Liu J, Liao J, Zhu X (2005) A system model and protocol for mobile payment. In IEEE International Conference on e-Business Engineering (ICEBE-2005), pp 638-641, 18-20 Oct 2005, Beijing, China

  209. Liu X, Zhang H, Fang J, Guan G, Huang Y (2016) Intelligent shopping cart with quick payment based on dynamic target tracking. In IEEE 4th International Conference on Cloud Computing and Intelligence Systems (CCIS’2016), pp 88-93, 17-19 August 2016, Beijing, China

  210. Liu Y, Zhao Q, Liu G, Chang L, Shen J (2017) A fairness-enhanced micropayment scheme. Wireless Personal Communications 96(4):5267–5278

    Article  Google Scholar 

  211. Lo J, Li-C Bishop J, Eloff JHP (2008) SMSSec: An end-to-end protocol for secure SMS. Computers & Security 27(5):154–167

    Article  Google Scholar 

  212. Lo NW, Yohan A (2020) BLE-based authentication protocol for micropayment using wearable device. Wireless Personal Communications 112(4):2351–2372

    Article  Google Scholar 

  213. Lu J, Yang Z, Li L, Yuan W, Li L, Chang CC (2017) Multiple schemes for mobile payment authentication using qr code and visual cryptography. Mobile Information Systems (Hindawi)

  214. Luarn P, Lin HH (2005) Toward an understanding of the behavioral intention to use mobile banking. Computers in human behavior 21(6):873–891

    Article  Google Scholar 

  215. Lukkari J, Korhonen J, Ojala T (2004) SmartRestaurant: mobile payments in context-aware environment. ACM Proceedings of the 6th international conference on Electronic commerce (ICEC’2004), pp 575-582, 25-27 October 2004, Delft, Netherlands

  216. Madan S (2016) Securing Transactions and Payment Systems for M-commerce. IGI Global

  217. Mainetti L, Patrono L, Vergallo R (2012) Idapay: A secure and efficient micro-payment system based on peer-to-peer nfc technology for android mobile devices. Journal of Communications Software and Systems 8(4):117–125

    Article  Google Scholar 

  218. Mali V (2016) Demonetization: A step towards modified india. International Journal of Commerce and Management Research 2(12):35–36

    Google Scholar 

  219. Mallat N (2007) Exploring consumer adoption of mobile payments-a qualitative study. The Journal of Strategic Information Systems 16(4):413–432

    Article  Google Scholar 

  220. Marcus A, Davidzon G, Law D, Verma N, Fletcher R, Khan A, Sarmenta L (2009) Using NFC-enabled mobile phones for public health in developing countries. In First IEEE International Workshop on Near Field Communication (NFC’09), pp 30-35, 24-24 Feb 2009, Hagenberg, Austria

  221. Marforio C, Karapanos N, Soriente C, Kostiainen K, Capkun S (2014) Smartphones as practical and secure location verification tokens for payments. NDSS 14:23–26

    Google Scholar 

  222. Markoska K, Ivanochko I et al (2017) Mobile Banking Services-Business Information Management with Mobile Payments. Agile Information Business 125–175

  223. Martins C, Oliveira T, Popovič A (2014) Understanding the internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. International Journal of Information Management 34(1):1–13

    Article  Google Scholar 

  224. Massoth M, Bingel T (2009) Performance of different mobile payment service concepts compared with a NFC-based solution. In Fourth International Conference on Internet and Web Applications and Services (ICIW’09), pp 205-210, 24-28 May 2009, Venice/Mestre, Italy

  225. Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3):709–734

    Article  Google Scholar 

  226. Mazumdar A, Giri D (2012) On-line electronic payment system using signcryption. Procedia Technology 6:930–938

    Article  Google Scholar 

  227. Me G, Schuster A (2005) A mobile local payment system bluetooth based. In International Symposium on Wireless Communications (ISWSN’05)

  228. Me G, Strangio MA (2005a) EC-PAY: an efficient and secure ECC-based wireless local payment scheme. In Third IEEE International Conference on Information Technology and Applications (ICITA’2005), Vol. 2, pp 442-447, 4-7 July 2005, Sydney, Australia

  229. Mezgec Z, Medved A, Chowdhury A, Svečko R (2008) Mobile Payments-Design of New Terminal. Informacije MIDEM 38(1):53–60

    Google Scholar 

  230. Miraz G, Ruiz IL, Gómez-Nieto MÁ (2009) How NFC can be used for the compliance of European higher education area guidelines in European universities. In First IEEE International Workshop on. Near Field Communication (NFC’09), pp 3-8, 24-24 Feb 2009, Hagenberg, Austria

  231. Mjolsnes SF, Rong C (2001) Localized credentials for server assisted mobile wallet. In IEEE International Conference on Computer Networks and Mobile Computing, pp 203-208, 16-19 Oct 2001, Beijing, China

  232. Monteiro DM, Rodrigues JJ, Lloret J (2012) A secure nfc application for credit transfer among mobile phones. In IEEE International Conference on Computer, Information and Telecommunication Systems (CITS’2012), pp 1-5, 14-16 May 2012, Amman, Jordan

  233. Moonsamy V, Batten L (2014) Mitigating man-in-the-middle attacks on smartphones-a discussion of ssl pinning and dnssec. In Proceedings of the 12th Australian Information Security Management Conference, pp 5-13

  234. Morak J, Hayn D, Kastner P, Drobics M, Schreier G (2009) Near field communication technology as the key for data acquisition in clinical research. In First IEEE International Workshop on. Near Field Communication (NFC’09), pp 15-19, 24- 24 Feb 2009, Hagenberg, Austria

  235. Morak J, Kollmann A, Schreier G et al (2007) Feasibility and usability of a home monitoring concept based on mobile phones and near & #xC;field communication (nfc) technology. Medinfo, IOS Press 2007:112–116

    Google Scholar 

  236. Morak J, Schwetz V, Hayn D, Fruhwald F, Schreier G (2008) Electronic data capture platform for clinical research based on mobile phones and near field communication technology. In 30th Annual IEEE International Conference on. Engineering in Medicine and Biology Society (EMBS’2008), pp 5334–5337, 20–25 (August 2008) Vancouver. BC, Canada

  237. Naji AW, Housain AS, Zaidan B, Zaidan A, Hameed SA (2011) Security improvement of credit card online purchasing system. Scientific Research and Essays 6(16):3357–3370

    Article  Google Scholar 

  238. Nandakuma R, Chintalapudi KK, Padmanabhan V, Venkatesan R (2013) Dhwani: secure peer-to-peer acoustic nfc. ACM SIGCOMM Computer Communication Review 43:63–74

    Article  Google Scholar 

  239. Naor M, Shami A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques 1–12

  240. Narendiran C, Rabara S.A, Rajendran N (2009) Public key infrastructure for mobile banking security. In IEEE Global Mobile Congress, pp 1-6, 12-14 October 2009, Shanghai, China

  241. Neefs J, Schrooyen F, Doggen J, Renckens K (2010) Paper ticketing vs. electronic ticketing based on off-line system’tapango’. In Second IEEE International Workshop on Near Field Communication (NFC’2010), pp 3-8, 20-20 April 2010, Monaco, Monaco

  242. Ngo HH, Dandash O, Le PD, Srinivasan B, Wilson C (2011) Formal verification of a secure mobile banking protocol. International Conference on Computer Science and Information Technology 410–421

  243. Nithya N, Kiruthika R (2021) Impact of Business Intelligence Adoption on performance of banks: a conceptual framework. J Ambient Intell Human Comput 12:3139–3150.

    Article  Google Scholar 

  244. Nguyen T, Shum P, Chua E (2005) Secure end-to-end mobile payment system. IET

  245. Nosrati L, Bidgoli A (2015) Security assessment of mobile-banking. In International Conference and Workshop on. Computing and Communication (IEMCON), pp 1–5. 15–17 (October 2015) University of British Columbia. Vancouver, Canada

  246. Nseir S, Hirzallah N, Aqel M (2013) A secure mobile payment system using qr code. 5th International Conference on Computer Science and Information Technology (CSIT), pp 111-114

  247. Ntt DoCoMo IM (2017) Mobile payments via phone bill.

  248. Nuakoh EB, Coffie I (2018) MonitR®: A Mobile Application for Monitoring Online Accounts’ Security. SoutheastCon 2018:1–9

    Google Scholar 

  249. Nyamtiga BW, Sam A, Laizer LS (2013) Security perspectives for ussd versus sms in conducting mobile transactions: A case study of tanzania. International journal of technology enhancements and emerging engineering research 1(3):38–43

    Google Scholar 

  250. Obinna O, Pfluegel E, Tunnicliffe MJ, Clarke CA (2018) Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp 1–7, 11–12 (June 2018) Glasgow. Scotland, UK

  251. Odelu V, Das AK, Goswami A (2016) SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics 62(1):30–38

    Article  Google Scholar 

  252. Oh S (2006)A stakeholder perspective on successful electronic payment systems diffusion. In Proceedings of the 39th IEEE Annual Hawaii International Conference on System Sciences (HICSS’06), 4-7 Janualry 2006, Vol. 8, pp 186b-186b, Kauia, HI, USA

  253. Ok K, Coskun V, Ozdenizci B (2012) Near field communication: From theory to practice. John Wiley and Sons

  254. Oliveira T, Thomas M, Baptista G, Campos F (2016) Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior 61:404–414

    Article  Google Scholar 

  255. Ondrus J, Camponovo G, Pigneur Y (2005) A proposal for a multi-perspective analysis of the mobile payment environment. In IEEE International Conference on. Mobile Business (ICMB’2005), pp 659-662, 11-13 July 2005, Sydney, Australia

  256. Ondrus J, Lyytinen K, Pigneur Y (2009) Why mobile payments fail? towards a dynamic and multiperspective explanation. In Proceedings of the 42nd Annual Hawaii International Conference on System Sciences (HICSS’2008), 05-08 January 2009, pp 1-10, Waikoloa, Big Island, Hawaii

  257. Ondrus J, Pigneur Y (2006) A multi-stakeholder multicriteria assessment framework of mobile payments: an illustration with the swiss public transportation industry. In Proceedings of the 39th IEEE Annual Hawaii International Conference on System Sciences (HICSS’06), Vol. 2, pp 42a–42a, 4–7 (January 2006) Kauia. HI, USA

  258. Ondrus J, Pigneur Y (2009) Near field communication: an assessment for future payment systems. Information Systems and E-Business Management 7(3):347–361

    Article  Google Scholar 

  259. Ou CM, Ou CR (2009) Adaptation of proxy certificates to non-repudiation protocol of agent based mobile payment systems. Applied Intelligence 30(3):233–243

    Article  Google Scholar 

  260. OWASP-2014 (Accessed: 06-09-2020)

  261. Pal D, Khethavath P, Chen T, Zhang Y (2017) Mobile payments in global markets using biometrics and cloud. International Journal of Communication Systems 30(14):e3293

    Article  Google Scholar 

  262. Paret D, Riesco R (2005) RFID and contactless smart card applications. Wiley Online Library

  263. Párhonyi R, Nieuwenhuis LJM, Pras A (2005) Second generation micropayment systems: lessons learned. ECommerce, E-Business, and E-Government, In Challenges of Expanding Internet, pp 345–359

  264. Park J, Baek K, Kang C (2013) Secure profile provisioning architecture for embedded UICC. In IEEE Eighth International Conference on. Availability, Reliability and Security (ARES’13), pp 297-303, 2-6 September 2013, Regensburg, Germany

  265. Park J, Kim K, Kim M (2008) The aegis: Uicc-based security framework. In Second IEEE International Conference on. Future Generation Communication and Networking, (FGCN’08), 13-15 December 2008, Vol. 1, pp 264-269, Sanya, Hainan Island, China

  266. Pasquet M, Reynaud J, Rosenberger C (2008) Secure payment with nfc mobile phone in the smarttouch project. In IEEE International Symposium on. Collaborative Technologies and Systems (CTS’2008), pp 121–126, 19–23 (May 2008) Irvine. CA, USA

  267. Patel R, Kunche A, Mishra N, Bhaiyat Z, Joshi R (2015) Paytooth-a cashless mobile payment system based on bluetooth. International Journal of Computer Applications 120(24)

  268. Paulson LC (2003) Verifying the set protocol: Overview. Formal Aspects of Security 4–14

  269. Popescu C (2009) An anonymous mobile payment system based on bilinear pairings. Informatica 20(4):579–590

    MathSciNet  MATH  Article  Google Scholar 

  270. Pourghomi P, Ghinea G et al (2013) A proposed nfc payment application. International Journal of Advanced Computer Science and Applications (IJACSA), 2013arXiv preprint arXiv:1312.2828, 4

  271. Pousttchi K (2008) A modeling approach and reference models for the analysis of mobile payment use cases. Electron Commer Res Appl 7(2):182–201

    Article  Google Scholar 

  272. Pousttchi K, Schiessler M, Wiedemann DG (2009) Proposing a comprehensive framework for analysis and engineering of mobile payment business models. Information Systems and E-Business Management 7(3):363–393

    Article  Google Scholar 

  273. Pousttchi K. Schurig M (2004) Assessment of today’s mobile banking applications from the view of customer requirements. In Proceedings of the IEEE 37th Annual Hawaii International Conference on System Sciences, pp 10

  274. Pradhan S, Lawrence E, Zmijewska A (2005) Bluetooth as an enabling technology in mobile transactions. International Conference on Information Technology: Coding and Computing, (ITCC’ 2005), Vol. 2, pp 53-58

  275. Prakasha K, Muniyal B, Acharya V (2019) Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure. Information Discovery and Delivery

  276. Qadeer M.A., Akhtar N, Govil S, Varshney A (2009) A novel scheme for mobile payment using RFID-enabled smart SIMcard. In IEEE International Conference on. Future Computer and Communication (ICFCC’2009), 3–5 (April 2009). Kuala Lumpar, Malaysia, pp 339–343

  277. Qi M, Yang C (2006) Design and applications of wireless set protocol. In Proceedings of the 3rd ACM international conference on Mobile technology, applications & systems, 25-27 October 2006, page 18, Bangkok, Thailand

  278. Rahman NABA, Harun KSB, Yusof YB (2013) SMS banking transaction as an alternative for information, transfer and payment at merchant shops in malaysia. 3rd International Conference on Information Technology and e-Services (ICITeS’2013), pp 1-6

  279. Romao A, da Silva MM (2001) Secure mobile agent digital signatures with proxy certificates. In E-Commerce Agents, pp 206-220

  280. Rubinov K, Rosculete L, Mitra T, Roychoudhury A (2016) Automated partitioning of android applications for trusted execution environments. In 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), pp 923-934

  281. Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1, pp 57-64

  282. Sadeghi A, Bagheri H, Garcia J, Malek S (2017) A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software. IEEE Transactions on Software Engineering 43(6):492–530

    Article  Google Scholar 

  283. Saeed MQ, Walter C, Pourghomi P, Ghinea G (2014) Mobile Transactions over NFC and GSM. IARIA

  284. Samadani MH., Shajari M, Ahaniha M (2010) A survey on mobile digital signature models. In Proceedings of the 12th ACM International Conference on. Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC’10), pp 141–145, 02–04 (August 2010) Honolulu. HI, USA

  285. Samanta S, Mohandas R, and Pais A.R (2012) Secure short message peer-to-peer protocol. International Journal of Electronic Commerce Studies, 3(1), pages 45

  286. Sánchez I, Cortés M, Riekki J (2007), Controlling multimedia players using nfc enabled mobile phones. In ACM Proceedings of the 6th international conference on. Mobile and ubiquitous multimedia (MUM’07), 12–14 (December 2007). Oulu, Finland, pp 118–124

  287. Sarajlic A, Omerasevic D (2007) Access channels in m-commerce services. 29th IEEE International Conference on Information Technology Interfaces (ITI’2007), 25–28 June 2007. Cavtat / Dubrovnik, Croatia, pp 507–512

  288. Saxena A, Das ML, Gupta A (2005) Mmps: a versatile mobile-to-mobile payment system. In IEEE International Conference on Mobile Business (ICMB’2005), 11–13 (July 2005). Australia, Sydney, pp 400–405

  289. Saxena N, Chaudhari NS (2012) Secure encryption with digital signature approach for short message service. In IEEE World Congress on, Information and Communication Technologies (WICT’2012), pp 803-806

  290. Saxena N, Shen H, Komninos N, Choo KR, Chaudhari NS (2018) BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users. IEEE Transactions on Dependable and Secure Computing 17(3):550–565

    Google Scholar 

  291. Schilke PF, Schierz O, Wirtz BW (2010) Understanding consumer acceptance of mobile payment services: An empirical analysis. Electron Commer Res Appl 9(3):209–216

    Article  Google Scholar 

  292. See-To EW, Papagiannidis S, Westland JC (2014) The moderating role of income on consumers’ preferences and usage for online and offline payment methods. Electronic Commerce Research 14(2):189–213

    Article  Google Scholar 

  293. Sekhar VC, Sarvabhatla M (2012) A secure account-based mobile payment protocol with public key cryptography. ACEEE International Journal on Network Security 3(1):5–9

    Google Scholar 

  294. Shaghayegh B (2011) Using service oriented architecture in a new anonymous mobile payment system. In IEEE 2nd International Conference on. Software Engineering and Service Science (ICSESS), 15–17 (July 2011). Beijing, China, pp 393–396

  295. Shaikh AA, Karjaluoto H (2015) Mobile banking adoption: A literature review. Telematics and Informatics 32(1):129–142

    Article  Google Scholar 

  296. Shedid SM, Kouta M (2010) Modified set protocol for mobile payment: an empirical analysis. In 2nd IEEE International Conference on. Software Technology and Engineering (ICSTE’2010), Vol. 1, pp V1–350, 03–05 (October 2010) San Juan. PR, USA

  297. Sherif MH (2016) Protocols for secure electronic commerce. CRC Press

    Google Scholar 

  298. Sherman M (2014), An introduction to mobile payments: market drivers, applications, and inhibitors. In Proceedings of the: 1st ACM International Conference on Mobile Software Engineering and Systems, (MOBILESoft’14), Hyderabad, India, June 2-3, 2014, pp 71-74

  299. Shin DH (2009) Towards an understanding of the consumer acceptance of mobile wallet. Computers in Human Behavior 25(6):1343–1354

    Article  Google Scholar 

  300. Shin DH (2010) Modeling the interaction of users and mobile payment system: Conceptual framework. International Journal of Human-Computer Interaction 26(10):917–940

    Article  Google Scholar 

  301. Siira E, Törmänen V (2010) The impact of NFC on multimodal social media application. In Second IEEE International Workshop on. Near Field Communication (NFC), 20–20 (April 2010). Monaco, Monaco, pp 51–56

  302. Siira, E, Tuikka T, Törmänen V (2009) Location-based mobile wiki using nfc tag infrastructure. In First IEEE International Workshop on. Near Field Communication, (NFC’09)

  303. Sinigaglia F, Carbone R, Costa G, Ranise S (2019) Mufasa: A tool for high-level specification and analysis of multi-factor authentication protocols. In Second International Workshop on Emerging Technologies for Authorization and Authentication, (ETAA’2019), pp 138-155, 27 September 2019, Luxembourg,

  304. Slade E, Williams M, Dwivedi Y, Piercy N (2015) Exploring consumer adoption of proximity mobile payments. Journal of Strategic Marketing 23(3):209–223

    Article  Google Scholar 

  305. Slade EL, Williams MD, Dwivedi YK (2013) Mobile payment adoption: Classification and review of the extant literature. The Marketing Review 13(2):167–190

    Article  Google Scholar 

  306. Solat S (2017) Security of electronic payment systems: A comprehensive survey. arXiv preprint arXiv:1701.04556

  307. Sorooshian S (2017) Business ethics for mobile network operators. Science and Engineering Ethics 1–2

  308. Steffen R, Preißinger J, Schöllermann T, Müller A, Schnabel I (2010) Near field communication (NFC) in an automotive environment. In Second IEEE International Workshop on. Near Field Communication (NFC), 20–20 (April 2010). Monaco, Monaco, pp 15–20

  309. Strommer E, Kaartinen J, Parkka J, Ylisaukkooja A, Korhonen I (2006) Application of near field communication for health monitoring in daily life. In 28th IEEE Annual International Conference on. Engineering in Medicine and Biology Society (EMBS’06), August 30–3 (Sept 2006). New York, NY, USA, pp 3246–3249

  310. Subpratatsavee P, Kuacharoen P (2015a) Transaction authentication using HMAC-based one-time password and QR code. Computer Science and its Applications 93–98

  311. Subpratatsavee P, Kuacharoen P (2015b) Internet banking transaction authentication using mobile one-time password and qr code. Advanced Science Letters 21(10):3189–3193

    Article  Google Scholar 

  312. Sulaiman A, Jaafar NI, Mohezar S (2006) An overview of mobile banking adoption among the urban community. International Journal of Mobile Communications 5(2):157–168

    Article  Google Scholar 

  313. Suryotrisongko H, Setiawan B et al (2012) A novel mobile payment scheme based on secure quick response payment with minimal infrastructure for cooperative enterprise in developing countries. Procedia-Social and Behavioral Sciences 65:906–912

    Article  Google Scholar 

  314. Tabakovic A (2014) The prepaid mobile wallet: A powerful product for an impatient ecosystem. Journal of Payments Strategy & Systems 8(3):254–263

    Google Scholar 

  315. Tansakul P, Halgamuge MN, Syed A (2019) Distinguish significant adoption factors that influence users’ behavioral expectation to utilize mobile payment: A survey. Structural Equation Modeling Approaches to E-Service Adoption 148–168

  316. Tanwar S et al (2016) Implementation of fairexchange and anonymous online e-cash protocol for e-commerce. International Journal of Information Technology and Computer Science (IJITCS) 8(8):66

    Article  Google Scholar 

  317. Tehrani MA, Amidian AA, Muhammadi J, Rabiee H (2010) A survey of system platforms for mobile payment. In Fourth International Conference on. Management of e-Commerce and e-Government (ICMeCG’2010), 23–24 (October 2010). Chengdu, China, pp 376–381

  318. Téllez Jesús, Zeadally S (2017a) Architectures and models for mobile payment systems. In Mobile Payment Systems, pp 35-91

  319. Téllez Jesús, Zeadally S (2017b) Mobile payment systems. Springer

  320. Terziyan V (2002) Ontological modelling of e-services to ensure appropriate mobile transactions. Intelligent Systems in Accounting, Finance and Management 11(3):159–172

    Article  Google Scholar 

  321. Thakur R, Srivastava M (2014) Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in india. Internet Research 24(3):369–392

    Article  Google Scholar 

  322. Thammarat C. Kurutach W (2018) A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification. Wireless Communications and Mobile Computing (Hindawi)

  323. Thammarat C. Kurutach W (2019) A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. International Journal of Communication Systems, page e3991

  324. Thammarat C (2020) Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol. Symmetry (MDPI) 12(10):1649

    Article  Google Scholar 

  325. Ting S, Tsang A.H (2012) Design of an RFID-based inventory control and management system: a case study. Faculty of engineering at the university of the west indies and the council of caribbean engineering organisations in trinidad and tobago, The West Indian journal of engineering

  326. Tiwari R, Buse S, Herstatt C (2007) Mobile services in banking sector: the role of innovative business solutions in generating competitive advantage: Technology and innovation managment working paper no. 48

  327. Toorani M, Beheshti A (2008a) SSMS-A secure SMS messaging protocol for the m-payment systems. IEEE Symposium on Computers and Communications, (ISCC’2008), pp 700-705

  328. Toorani M, Beheshti A (2008b) LPKI-a lightweight public key infrastructure for the mobile environments. 11th IEEE Singapore International Conference on Communication Systems (ICCS’2008), 19–21 November 2008. Guangzhou, China, pp 162–166

  329. Trichina E, Hyppönen K, Hassinen M (2007) SIM-enabled open mobile payment system based on nation-wide PKI. ISSE 355–366

  330. Tripathi D.M (2011) A note on modified set protocol for mobile payment. In IEEE Sixth International Conference on. Internet Technology and Secured Transactions (ICITST’2011), pp 639-641, 11-14 December, Abu Dhabi, UAE

  331. Tsaur WJ, Yeh LY, Juang TY (2011) Efficient and secure ECC-based electronic cash payment applications for internet consumers. In The 18th Int’l Conf on Internet Computing and Internet of Things (ICOMP’17), 17–20, (2017) Las Vegas. Nevada, USA

  332. Tuecke S, Welch V, Engert D, Pearlman L, Thompson M et al (2004) Internet X.509 public key infrastructure (pki) proxy certificate profile. Technical report, RFC-3820 (Proposed Standard)

  333. Turk I, Angin P, Cosar A (2019) RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions. IEEE Access 7:95315–95328

    Google Scholar 

  334. Van Damme G, Luyckx N, Wouters K (2011) A PKI-based mobile banking demonstrator. EuroPKI 147–158

  335. Varshney U (2002) Mobile payments. Computer 35(12):120–121

    Article  Google Scholar 

  336. Veijalainen J, Terziyan V, Tirri H (2006) Transaction management for m-commerce at a mobile terminal. Electron Commer Res Appl 5(3):229–245

    Article  Google Scholar 

  337. Vergara M, Díaz-Hellín P, Fontecha J, Hervás R, Sánchez-Barba C, Fuentes C, Bravo J (2010) Mobile prescription: An NFC-based proposal for AAL. In Second IEEE International Workshop on. Near Field Communication (NFC), pp 27-32, 20-20 April 2010, Monaco, Monaco

  338. Verkijika SF (2020) An affective response model for understanding the acceptance of mobile payment systems. Electron Commer Res Appl, 39(100905),

  339. Vesal SN, Fathian M (2012) Efficient and secure credit card payment protocol for mobile devices. International Journal of Information and Computer Security 5(2):105–114

    Article  Google Scholar 

  340. Viehland D, Leong RSY (2007) Acceptance and use of mobile payments. ACIS 2007 Proceedings, page 16

  341. Vincent OR, Okediran TM, Abayomi-Alli AA, Adeniran OJ (2020) An identity-based elliptic curve cryptography for mobile payment security. SN Computer Science 1(2):1–12

    Article  Google Scholar 

  342. Wan Z, Qing W (2010) Secure mobile payment based on super set protocol. In 2nd IEEE International Conference on. Advanced Computer Control (ICACC), Vol 2, pp 640-643, 27-29 March 2010, Shenyang, China

  343. Wang C, Sun H, Zhang H, Jin Z (2013) An improved off-line electronic cash scheme. In Fifth IEEE International Conference on. Computational and Information Sciences (ICCIS’2013), pp 438-441, 21-23 June 2013, Shiyang, China

  344. Wang F, Chang CC, Chang SC (2016a) Robust off-line e-cash scheme with recoverability and anonymity revocation. Security and Communication Networks 9(14):2412–2421

    Article  Google Scholar 

  345. Wang F, Chang C-C, Lin C (2016b) Security analysis on secure untraceable off-line electronic cash system. IJ Network Security 18(3):454–458

    Google Scholar 

  346. Wang JS, Yang FY, Paik I (2011) A novel ecash payment protocol using trapdoor hash function on smart mobile devices. Int J Comput Sci Netw Secur (IJCSNS) 11(6):12–19

    Google Scholar 

  347. Wazid M, Zeadally S, Das AK (2019) Mobile banking: Evolution and threats: Malware threats and security solutions. IEEE Consumer Electronics Magazine 8(2):56–60

    Article  Google Scholar 

  348. Wei KJ, Lee JS, Chen SJ (2015) Enhancing the Security of Credit Card Transaction based on Visual DSC. KSII Transactions on Internet and Information Systems (TIIS) 9(3):1231–1245

    Google Scholar 

  349. Wen X, Chen Y, Fang J (2013) An interbank e-payment protocol based on quantum proxy blind signature. Quantum information processing 12(1):549–558

    MathSciNet  MATH  Article  Google Scholar 

  350. Xin W, Yuan CW (2010) An semi-anonymity offline mobile payment protocol based on smart card. J China Univ Posts Telecommun 17:63–66

    Google Scholar 

  351. Xu J, Xue K, Yang Q, Hong P (2018) PSAP: Pseudonym-based secure authentication protocol for NFC applications. IEEE Transactions on Consumer Electronics 64(1):83–91

    Article  Google Scholar 

  352. Yang D, Wang Q (2011) The study on the application of rfid-based mobile payment to the internet of things. In International Conference on. Multimedia Technology (ICMT’2011), pp 908-911, 26-28 July 2011, Hangzhou, China

  353. Yang F.Yi, Liu Z.Wei, Chiu SH (2011) Mobile banking payment system. Wirel Mob Netw Ubiquitous Comput Dependable Appl 2(3):85-95

  354. Yang FY, Chiu SH, Chen HY (2012) A new E-cash scheme based on a trapdoor hash function. Adv Inf Sci Serv Sci pp 229-237

  355. Yang KC (2005) Exploring factors affecting the adoption of mobile commerce in singapore. Telematics Inform 22(3):257–277

    Article  Google Scholar 

  356. Yang S, Lu Y, Gupta S, Cao Y, Zhang R (2012) Mobile payment services adoption across time: an empirical study of the effects of behavioral beliefs, social influences, and personal traits. Comput Hum Behav 28(1):129–142

    Article  Google Scholar 

  357. Yang W, Hu J, Yang J, Wang S, Shu L (2013) Biometrics for securing mobile payments: Benefits, challenges and solutions. In 6th IEEE International Congress on. Image and Signal Processing (CISP’2013), Vol. 3, pp 1699-1704, 16- 18 December 2013, Hangzhou, China,

  358. Yang W, Zhang Y, Li J, Liu H, Wang Q, Zhang Y, Gu D (2017) Show me the money! finding flawed implementations of third-party in-app payment in android apps. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA

  359. Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: a review. Symmetry 11(2):141

    Article  Google Scholar 

  360. Yeh KH (2018) A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments. IEEE Syst J 12(2):2027–2038

    Article  Google Scholar 

  361. Yeh TC, Peng JR, Wang SS, Hsu JP (2012) Securing bluetooth communications. IJ. Netw Secur 14(4):229–23

    Google Scholar 

  362. Yıldırım N, Varol A (2014) Mobile biometric security systems for today and future. Proceeding Book, page 86

  363. Yohan A, Lo NW, Randy V, Chen SJ, Hsu MY (2016) A novel authentication protocol for micropayment with wearable devices. In ACM Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, page 18, January 04 - 06, 2016, Danang, VietNam

  364. Yohan A, Lo NW, Winata D (2018) An indoor positioning-based mobile payment system using bluetooth low energy technology. Sensors 18(4):974

    Article  Google Scholar 

  365. Yomas J, Kiran NC (2019) An effective hardware-based bidirectional security aware mpayment system by using biometric authentication. In Computer Science On-line Conference, pp 99-108

  366. Yue W (2015) Semopias: A novel secure and efficient mutual open PKI identity authentication scheme for mobile commerce. In The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems, pp 373-380, July 14-15 2015, Hohhot, China

  367. Zhanga A, Yue X, Kong Y (2011) Exploring culture factors affecting the adoption of mobile payment. In Tenth IEEE International Conference on Mobile Business (ICMB), pp 263-267, June 20-21 2011, Como, Italy

  368. Zhao H, Muftic S (2011a) The concept of secure mobile wallet. IEEE World Congress on Internet Security (WorldCIS) 54–58

  369. Zhao H, Muftic S (2011b) Design and implementation of a mobile transactions client system: Secure UICC mobile wallet. Int J Inf Secur Res 1(3):113–120

    Google Scholar 

  370. Zheng X, Chen D (2003) Study of mobile payments system. IEEE International Conference On E-Commerce (CEC’2003), pp 24–27

  371. Zheng X, Yang L, Ma J, Shi G, Meng D (2016) Trustpay: Trusted mobile payment on security enhanced arm trustzone platforms. In 2016 IEEE Symposium on Computers and Communication (ISCC), pp 456–462

  372. Zhou T (2011) The effect of initial trust on user adoption of mobile payment. Inf Dev 27(4):290–300

    Article  Google Scholar 

  373. Zhou T (2014) An empirical examination of initial trust in mobile payment. Wirel Personal Commun 77(2):1519–1531

    Article  Google Scholar 

  374. Zhou T, Lu Y, Wang B (2010) Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Hum Behav 26(4):760–767

    Article  Google Scholar 

  375. Zhu X, Hou Z, Hu D, Zhang J (2016) Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority. In 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS’2016), pp 452–465, 16–18 November 2016, China

  376. Zhu Y et al (2010) A new architecture for secure two-party mobile payment transactions. Dissertation, Lethbridge, Alta.: University of Lethbridge, c2010

  377. Zhu Y, Rice JE (2009) A lightweight architecture for secure two-party mobile payment. In International Conference on. Computational Science and Engineering (CSE’09), Vol. 2, pp 326–333, Vancouver. BC, Canada

  378. Zmijewska A, Lawrence E (2005) Reshaping the framework for analysing success of mobile payment solutions. Proceedings of the IADIS International Conference on E-commerce, Porto, Portugal

  379. Zope SR, Limkar M (2012) RFID based bill generation and payment through mobile. Int J Comput Sci Netw Secur (IJCSNS), Citeseer, 1(3)

  380. Zou J, Zhang C, Dong C, Fan C, Wen Z (2010) Mobile payment based on RFID-sim card. IEEE 10th International Conference onComputer and Information Technology (CIT), June 29-July 01 2010. Bradford, United Kingdom, pp 2052–2054

Download references

Author information



Corresponding author

Correspondence to Sriramulu Bojjagani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Bojjagani, S., Sastry, V.N., Chen, CM. et al. Systematic survey of mobile payments, protocols, and security infrastructure. J Ambient Intell Human Comput (2021).

Download citation


  • Mobile banking
  • Mobile payments
  • Systematic literature review
  • Security in mobile payments
  • Stakeholders