5Yuan D, Fan Z P. A secure dynamic password authentication scheme[ J ]. Journal of Sichuan University ( Natural Science Edition), 2002, 39(2):228 - 232.
6Neil M, Haller. The S/KEY one-time password system.RCF1760[M]. Network Working Group, 1994.
7Schneier B. The secure Hash algorithm directory MD5,SHA-1 and HMAC resources [EB/OL]. http://www.secure-hash-algorithm-md5sha-1. co. uk/. 2003 - 11 -9.
8吴世忠 祝世雄 张文政 等.应用密码学[M].北京:机械工业出版社,2000..
9卢开澄.计算机密码学[M].北京:清华大学出版社,1998..
10Burt Kaliski.Hash Function Firewalls in Signature Schemes. RSA Laboratories, 2000-06
2Quan SN. Multi-dimensional Hash chains and application to micropayment schemes [C]. Bergen, Norway: Proe of Interna- tional Workshop on Coding and Cryptography, 2005:96-106.
3Zhao Meiyuan,Sean W Smith. Modeling and evaluation of certification path discovery in the emerging global PKI[M]. Springer-Verlag Berlin Heidelbeg,2006:16-30.
4Cristina Satizabal. Reducing the computational cost of certification path validation in mobile payment[M]. Springer-Verlag Berlin Heidelbeg,2007:280-296.
5Gao J,Shim S.P2P-Paid: A peer-to-peer wireless payment system[C].Second IEEE International Workshop on Mobile Commerce and Services, 2005:102-111.