Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
暂无分享,去创建一个
[1] Upkar Varshney,et al. Mobile Commerce: Framework, Applications and Networking Support , 2002, Mob. Networks Appl..
[2] Robert R. Harmon,et al. Location-based services: models for strategy development in M-commerce , 2003, PICMET '03: Portland International Conference on Management of Engineering and Technology Technology Management for Reshaping the World, 2003..
[3] Paul Reid,et al. Biometrics for Network Security , 2003 .
[4] Keiji Tachikawa. A perspective on the evolution of mobile communications , 2003, IEEE Commun. Mag..
[5] Bruce Potter,et al. Wireless Security's Future , 2003, IEEE Secur. Priv..
[6] Upkar Varshney. Multicast Support in Mobile Commerce Applications , 2002, Computer.
[7] James A. Senn,et al. The Emergence of M-Commerce , 2000, Computer.
[8] Keng Siau,et al. Mobile communications and mobile services , 2003, Int. J. Mob. Commun..
[9] S. Hui. Challenges in the Migration to 4 G Mobile Systems , 2022 .
[10] Savo Glisic. Advanced Wireless Communications: 4G Technologies , 2004 .
[11] G. Held. The ABCs of IEEE 802.77 , 2001 .
[12] Upkar Varshney,et al. Issues in Emerging 4G Wireless Networks , 2001, Computer.
[13] L. Garber,et al. Will 3G really be the next big wireless technology , 2002 .
[14] Norman Sadeh,et al. M-Commerce: Technologies, Services, and Business Models , 2002 .
[15] E. Turban,et al. Electronic Commerce 2004: A Managerial Perspective , 2003 .
[16] Gilbert Held. The ABCs of IEEE 802.11 - IT Professional , 2001 .
[17] Alan Kai-Hau Yeung,et al. Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..
[18] K. Baughan,et al. Visions of 4G , 2000 .
[19] John G. Proakis,et al. Digital Communications , 1983 .
[20] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[21] J. Tellado,et al. A fourth-generation MIMO-OFDM broadband wireless system: design, performance, and field trial results , 2002, IEEE Commun. Mag..
[22] M. Riezenman. Cellular security: better, but foes still lurk , 2000 .
[23] Asha K. Mehrotra. Cellular Radio: Analog and Digital Systems , 1994 .
[24] H. Albert Napier,et al. E-Business Technologies , 2002 .
[25] Yufei Yuan,et al. Towards an appropriate business model for m-commerce , 2003, Int. J. Mob. Commun..
[26] Batya Friedman,et al. Trust online , 2000, CACM.
[27] S. Cherry,et al. Edholm's law of bandwidth , 2004, IEEE Spectrum.
[28] Keng Siau,et al. Building customer trust in mobile commerce , 2003, CACM.
[29] Theodore Zahariadis. Trends in the path to 4G , 2003 .
[30] Kiho Kim,et al. Beyond 3G: vision, requirements, and enabling technologies , 2003, IEEE Commun. Mag..
[31] I. D. Robertson,et al. RF id tagging explained , 2003 .
[32] Randall K. Nichols,et al. Wireless Security: Models, Threats, and Solutions , 2001 .
[33] Willie W. Lu. 4G mobile research in Asia , 2003, IEEE Communications Magazine.
[34] Andrew Dornan,et al. The Essential Guide to Wireless Communications Applications, Second Edition: From Cellular Systems to Wi-Fi , 2002 .
[35] E. Buracchini,et al. The software radio concept , 2000, IEEE Commun. Mag..
[36] Heiko Knospe,et al. Secure mobile commerce , 2002 .
[37] Jaakko J. Sauvola,et al. Features in future: 4G visions from a technical perspective , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).