Secure and Trusted Mobile Commerce System based on Virtual Currencies
暂无分享,去创建一个
[1] Alexander Pretschner,et al. A Trustworthy Usage Control Enforcement Framework , 2013, Int. J. Mob. Comput. Multim. Commun..
[2] John Hughes. Feature: Enabling E-Commerce Through PKI , 2000 .
[3] Federico Mancini,et al. Secure data storage for Java ME-based mobile data collection systems , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).
[4] Gianluigi Me. Security overview for m-payed virtual ticketing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[5] Nalini Venkatasubramanian,et al. Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[6] Max Mühlhäuser,et al. Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services , 2011, J. Inf. Process..
[7] Haitham S. Hamza,et al. Towards a Unified Trust Model for M-commerce Systems , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[8] Stefan Scheer,et al. Will the Cloud Make the Citizen More Vulnerable? - Risk and Vulnerability Assessment in times of Cloud-computing , 2012, CLOSER.
[9] Ricardo Neisse,et al. A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[10] Edmundo Roberto Mauro Madeira,et al. Exploiting a generic approach for constructing mobile device applications , 2009, COMSWARE '09.
[11] Igor Nai Fovino,et al. Data-in-use leakages from Android memory — Test and analysis , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[12] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[13] Ming Yin,et al. The SIM-based mobile wallet , 2009, 2009 13th International Conference on Intelligence in Next Generation Networks.
[14] Ming-Yen Lin,et al. Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[15] Klaus Moessner,et al. A Cognitive Management Framework to Support Exploitation of the Future Internet of Things , 2012, Scalable Comput. Pract. Exp..
[16] Zeljko Hutinski,et al. The role of perceived privacy and perceived security in online market , 2012, 2012 Proceedings of the 35th International Convention MIPRO.
[17] Ioannis Kounelis,et al. Trust in Mobile Commerce , 2012, NordiCHI 2012.
[18] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[19] Chin-Chen Chang,et al. A Secure E-coupon System for Mobile Users , 2006 .
[20] Ulrike Meyer,et al. On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[21] Mohamed Adel Serhani,et al. Toward an Efficient Framework for Designing, Developing, and Using Secure Mobile Applications , 2009 .
[22] Pankaj Madan,et al. Factors Influencing B2C M-Commerce Satisfaction and Trust towards M-Commerce Service Providers , 2012 .
[23] Preeti Garg,et al. Secure Data Storage in Mobile Cloud Computing , 2013 .
[24] David A. Cooper,et al. Personal Identity Verification (PIV) of Federal Employees and Contractors | NIST , 2013 .
[25] Ioannis Kounelis,et al. The mobileak project: Forensics methodology for mobile application privacy assessment , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[26] Feng Zhang. Secure Applications for Financial Environments (SAFE) System , 2010 .
[27] Sead Muftic,et al. Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications , 2012, SECURWARE 2012.
[28] Ming Gu,et al. Lightweight security for mobile commerce transactions , 2003, Comput. Commun..
[29] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[30] Ioannis Kounelis. Security System for Mobile Commerce Applications , 2013 .
[31] Donald E. Eastlake,et al. Requirements and Design for Voucher Trading System (VTS) , 2003, RFC.
[32] Françoise André,et al. A generic approach to satisfy adaptability needs in mobile environments , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[33] Abdul Ghafoor,et al. CryptoNET: Design and implementation of the Secure Email System , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[34] Giacomo Boracchi,et al. A fast eavesdropping attack against touchscreens , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[35] Jian Zhu,et al. Security and Access Control for a Human-centric Collaborative Commerce System , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).
[36] C. R. Snow,et al. A proxy approach to e-mail security , 1999 .
[37] J. Noll,et al. SIM as Secure Key Storage in Communication Networks , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[38] Saad Z. Asif. Smart Wireless Devices , 2010 .
[39] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[40] Upkar Varshney,et al. Mobile Commerce: A New Frontier , 2000, Computer.
[41] Igor Nai Fovino,et al. A Permission verification approach for android mobile applications , 2015, Comput. Secur..
[42] Tommy Egeberg,et al. Storage of sensitive data in a Java enabled cell phone , 2006 .
[43] Gianmarco Baldini,et al. An Architecture for Secure m-Commerce Applications , 2013, 2013 19th International Conference on Control Systems and Computer Science.
[44] Sead Muftic,et al. Secure Middleware for Mobile Phones and UICC Applications , 2011, MOBILWARE.
[45] Hao Zhao. Secure Management of Multi-Application Mobile Platforms , 2014 .
[46] Chang-Tien Lu,et al. Analysis of payment transaction security in mobile commerce , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[47] Igor Nai Fovino,et al. In-memory credentials robbery on android phones , 2013, World Congress on Internet Security (WorldCIS-2013).
[48] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[49] Ji Wei,et al. Research on the Security of an Improved E-commerce Model , 2010, 2010 International Conference on E-Business and E-Government.