Ranking secure technologies in security provision financial transactions mobile commerce
暂无分享,去创建一个
Fatemeh Saghafi | Fatemeh NasserEslami | Maryam Esmaili | F. Saghafi | Fatemeh NasserEslami | M. Esmaili
[1] D. Brent Chapman,et al. Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.
[2] Perry B. Gentry. What is a VPN? , 2001, Inf. Secur. Tech. Rep..
[3] Ulla Koivukoski,et al. Managing Mobile Services: Technologies and Business Practices , 2005 .
[4] Silvana Trimi,et al. M-government: technologies, applications and challenges , 2008, Electron. Gov. an Int. J..
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[6] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .
[7] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[8] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Upkar Varshney,et al. Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..
[11] Steve Burnett,et al. RSA Security's official guide to cryptography , 2001 .
[12] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[13] John A. Clark,et al. A Survey of Authentication Protocol Literature , 2010 .
[14] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[15] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[16] Athanasios Karantjias,et al. A Secure Mobile Framework for m-Services , 2008, 2008 Third International Conference on Internet and Web Applications and Services.