-
1
-
-
77953534539
-
Payment card rewards programs and consumer payment choice
-
A. T. Ching and F. Hayashi, Payment card rewards programs and consumer payment choice, Journal of Banking & Finance, vol.34, no.8, pp.1773-1787, 2010.
-
(2010)
Journal of Banking & Finance
, vol.34
, Issue.8
, pp. 1773-1787
-
-
Ching, A.T.1
Hayashi, F.2
-
2
-
-
44149090512
-
Past, present and future of mobile payments research: A literature review
-
T. Dahlberg, N. Mallat, J. Ondrus and A. Zmijewska, Past, present and future of mobile payments research: A literature review, Electronic Commerce Research and Applications, vol.7, no.2, pp.165181, 2008.
-
Electronic Commerce Research and Applications
, vol.7
, Issue.2
, pp. 2008
-
-
Dahlberg, T.1
Mallat, N.2
Ondrus, J.3
Zmijewska, A.4
-
3
-
-
77953488924
-
New contributions, empirical results, and unanswered questions
-
D. B. Humphrey, Retail payments: New contributions, empirical results, and unanswered questions, Journal of Banking & Finance, vol.34, no.8, pp.1729-1737, 2010.
-
(2010)
Journal of Banking & Finance
, vol.34
, Issue.8
, pp. 1729-1737
-
-
Humphrey, D.B.1
Payments, R.2
-
4
-
-
84871361720
-
-
iCash, http://www.icash.com.tw/index.asp.
-
ICash
-
-
-
5
-
-
61849090026
-
Sills,Retailer pricing and competitive effects
-
P. Kopalle, D. Biswas, P. K. Chintagunta, J. Fan, K. Pauwels, B. T. Ratchford and J. A. Sills,Retailer pricing and competitive effects, Journal of Retailing, vol.85, no.1, pp.56-70, 2009.
-
(2009)
Journal of Retailing
, vol.85
, Issue.1
, pp. 56-70
-
-
Kopalle, P.1
Biswas, D.2
Chintagunta, P.K.3
Fan, J.4
Pauwels, K.5
Ratchford, B.T.6
-
6
-
-
84864775732
-
An improved secure dynamic ID based remote user authentication scheme for multi-server environment
-
C. C. Lee, Y. M. Lai and C. T. Li, An improved secure dynamic ID based remote user authentication scheme for multi-server environment, International Journal of Security and Its Applications, vol.6, no.2, pp.203-210, 2012.
-
(2012)
International Journal of Security and Its Applications
, vol.6
, Issue.2
, pp. 203-210
-
-
Lee, C.C.1
Lai, Y.M.2
Li, C.T.3
-
7
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C. T. Li and M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, no.1, pp.1-5, 2010.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
8
-
-
80052436479
-
A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing
-
C. T. Li, C. C. Lee, L. J. Wang and C. J. Liu, A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing, Information and Control, vol.7, no.8, pp.4821-4831, 2011.
-
(2011)
Information and Control
, vol.7
, Issue.8
, pp. 4821-4831
-
-
Li, C.T.1
Lee, C.C.2
Wang, L.J.3
Liu, C.J.4
-
9
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
C. T. Li and C. C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Mathematical and Computer Modelling, vol.55, no.1-2, pp.35-44, 2012.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
10
-
-
84864767445
-
Two-factor user authentication in multi-server networks
-
C. T. Li, C. Y. Weng and C. I. Fan, Two-factor user authentication in multi-server networks, International Journal of Security and Its Applications, vol.6, no.2, pp.261-268, 2012.
-
(2012)
International Journal of Security and Its Applications
, vol.6
, Issue.2
, pp. 261-268
-
-
Li, C.T.1
Weng, C.Y.2
Fan, C.I.3
-
11
-
-
84871363867
-
A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications
-
C. T. Li, A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications, Information Technology and Control, vol.41, no.1, pp.69-76, 2012.
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 69-76
-
-
Li, C.T.1
-
12
-
-
84863127067
-
A secure routing protocol with node selfishness resistance in MANETs
-
C. T. Li, C. C. Yang and M. S. Hwang, A secure routing protocol with node selfishness resistance in MANETs, International Journal of Mobile Communications, vol.10, no.1, pp.103-118, 2012.
-
(2012)
International Journal of Mobile Communications
, vol.10
, Issue.1
, pp. 103-118
-
-
Li, C.T.1
Yang, C.C.2
Hwang, M.S.3
-
13
-
-
78650177346
-
Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008
-
W. P. Liao, T. M. Y. Lin and S. H. Liao, Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008, Decision Support Systems, vol.50, no.2, pp.548-556, 2011.
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 548-556
-
-
Liao, W.P.1
Lin, T.M.Y.2
Liao, S.H.3
-
15
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
S. Piramuthu, Protocols for RFID tag/reader authentication, Decision Support Systems, vol.43, no.3, pp.897-914, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
16
-
-
77957819564
-
A literature review on the impact of RFID technologies on supply chain management
-
A. Sarac, N. Absi and S. Dauzère-Pérès, A literature review on the impact of RFID technologies on supply chain management, International Journal of Production Economics, vol.128, no.1, pp.77-95,2010.
-
(2010)
International Journal of Production Economics
, vol.128
, Issue.1
, pp. 77-95
-
-
Sarac, A.1
Absi, N.2
Dauzère-Pérès, S.3
|