A Study on Financing Security for Smartphones Using Text Mining
暂无分享,去创建一个
[1] G. P. Biswas,et al. Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography , 2016, Wirel. Pers. Commun..
[2] Seong-Taek Park,et al. A Study on Factors Affecting the Adoption of LTE Mobile Communication Service: The Case of South Korea , 2016, Wirel. Pers. Commun..
[3] Tae-Gu Kang,et al. A Case Study on Effective Technique of Distributed Data Storage for Big Data Processing in the Wireless Internet Environment , 2016, Wirel. Pers. Commun..
[4] Eun-Mi Park,et al. Erratum to: Factors affecting the continuous use of cloud service: focused on security risks , 2016, Cluster Computing.
[5] Tae-Hyoung Park,et al. A Study on Improving the Electronic Financial Fraud Prevention Service: Focusing on an Analysis of Electronic Financial Fraud Cases in 2013 , 2014, Inscrypt 2014.
[6] Dong Hoon Lee,et al. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern , 2014 .
[7] Sang-Ho Lee,et al. A Method of Enhancing Security of Internet Banking Service using Contents-Based CAPTCHA , 2013, Inscrypt 2013.
[8] Kyoo-Sung Noh,et al. A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment , 2016, Wirel. Pers. Commun..
[9] Dea-Woo Park. Analysis of Mobile Smishing Hacking Trends and Security Measures , 2015 .
[10] Minho Park,et al. OTP-Based Transaction Verification Protocol Using PUFs , 2013 .
[11] Hong Jin,et al. The Effects of Consumer Characteristics on Information Searching Behavior in Wireless Mobile SNS: Using SEM Analysis , 2017, Wirel. Pers. Commun..
[12] Ki-Hong Park,et al. Countermeasure against Social Technologic Attack using Privacy Input-Detection , 2012 .
[13] Hwajeong Seo,et al. Design and Implementation of Physical Secure Card for Financial Security , 2015 .
[14] Jong-Gun Song,et al. A new password authentication scheme using two-way password in Smartphone Banking , 2012 .
[15] 사준호,et al. Real-time Phishing Site Detection Method , 2012 .
[16] Mi-Hyun Ko,et al. The effects of leadership by types of soccer instruction on big data analysis , 2016, Cluster Computing.
[17] Do-Young Kim,et al. A Proposal of Smart Phone App for Preventing Smishing Attack , 2015 .