Secure and Trusted Mobile Commerce System based on Virtual Currencies

With the widespread usage of mobile devices and their applications, many areas of innovation have created a multitude of opportunities for mobile technologies to be deployed with very interesting e ...

[1]  Alexander Pretschner,et al.  A Trustworthy Usage Control Enforcement Framework , 2013, Int. J. Mob. Comput. Multim. Commun..

[2]  John Hughes Feature: Enabling E-Commerce Through PKI , 2000 .

[3]  Federico Mancini,et al.  Secure data storage for Java ME-based mobile data collection systems , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).

[4]  Gianluigi Me Security overview for m-payed virtual ticketing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[5]  Nalini Venkatasubramanian,et al.  Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[6]  Max Mühlhäuser,et al.  Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services , 2011, J. Inf. Process..

[7]  Haitham S. Hamza,et al.  Towards a Unified Trust Model for M-commerce Systems , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[8]  Stefan Scheer,et al.  Will the Cloud Make the Citizen More Vulnerable? - Risk and Vulnerability Assessment in times of Cloud-computing , 2012, CLOSER.

[9]  Ricardo Neisse,et al.  A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[10]  Edmundo Roberto Mauro Madeira,et al.  Exploiting a generic approach for constructing mobile device applications , 2009, COMSWARE '09.

[11]  Igor Nai Fovino,et al.  Data-in-use leakages from Android memory — Test and analysis , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[12]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[13]  Ming Yin,et al.  The SIM-based mobile wallet , 2009, 2009 13th International Conference on Intelligence in Next Generation Networks.

[14]  Ming-Yen Lin,et al.  Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[15]  Klaus Moessner,et al.  A Cognitive Management Framework to Support Exploitation of the Future Internet of Things , 2012, Scalable Comput. Pract. Exp..

[16]  Zeljko Hutinski,et al.  The role of perceived privacy and perceived security in online market , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[17]  Ioannis Kounelis,et al.  Trust in Mobile Commerce , 2012, NordiCHI 2012.

[18]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .

[19]  Chin-Chen Chang,et al.  A Secure E-coupon System for Mobile Users , 2006 .

[20]  Ulrike Meyer,et al.  On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[21]  Mohamed Adel Serhani,et al.  Toward an Efficient Framework for Designing, Developing, and Using Secure Mobile Applications , 2009 .

[22]  Pankaj Madan,et al.  Factors Influencing B2C M-Commerce Satisfaction and Trust towards M-Commerce Service Providers , 2012 .

[23]  Preeti Garg,et al.  Secure Data Storage in Mobile Cloud Computing , 2013 .

[24]  David A. Cooper,et al.  Personal Identity Verification (PIV) of Federal Employees and Contractors | NIST , 2013 .

[25]  Ioannis Kounelis,et al.  The mobileak project: Forensics methodology for mobile application privacy assessment , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[26]  Feng Zhang Secure Applications for Financial Environments (SAFE) System , 2010 .

[27]  Sead Muftic,et al.  Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications , 2012, SECURWARE 2012.

[28]  Ming Gu,et al.  Lightweight security for mobile commerce transactions , 2003, Comput. Commun..

[29]  Siani Pearson,et al.  Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.

[30]  Ioannis Kounelis Security System for Mobile Commerce Applications , 2013 .

[31]  Donald E. Eastlake,et al.  Requirements and Design for Voucher Trading System (VTS) , 2003, RFC.

[32]  Françoise André,et al.  A generic approach to satisfy adaptability needs in mobile environments , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[33]  Abdul Ghafoor,et al.  CryptoNET: Design and implementation of the Secure Email System , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.

[34]  Giacomo Boracchi,et al.  A fast eavesdropping attack against touchscreens , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[35]  Jian Zhu,et al.  Security and Access Control for a Human-centric Collaborative Commerce System , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).

[36]  C. R. Snow,et al.  A proxy approach to e-mail security , 1999 .

[37]  J. Noll,et al.  SIM as Secure Key Storage in Communication Networks , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[38]  Saad Z. Asif Smart Wireless Devices , 2010 .

[39]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[40]  Upkar Varshney,et al.  Mobile Commerce: A New Frontier , 2000, Computer.

[41]  Igor Nai Fovino,et al.  A Permission verification approach for android mobile applications , 2015, Comput. Secur..

[42]  Tommy Egeberg,et al.  Storage of sensitive data in a Java enabled cell phone , 2006 .

[43]  Gianmarco Baldini,et al.  An Architecture for Secure m-Commerce Applications , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[44]  Sead Muftic,et al.  Secure Middleware for Mobile Phones and UICC Applications , 2011, MOBILWARE.

[45]  Hao Zhao Secure Management of Multi-Application Mobile Platforms , 2014 .

[46]  Chang-Tien Lu,et al.  Analysis of payment transaction security in mobile commerce , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..

[47]  Igor Nai Fovino,et al.  In-memory credentials robbery on android phones , 2013, World Congress on Internet Security (WorldCIS-2013).

[48]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[49]  Ji Wei,et al.  Research on the Security of an Improved E-commerce Model , 2010, 2010 International Conference on E-Business and E-Government.