Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
暂无分享,去创建一个
[1] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[2] Lucas Hc. The evolution of an information system: from key-man to every person. , 1978 .
[3] A. Stinchcombe. Constructing Social Theories , 1970 .
[4] Minna Mattila. Factors Affecting The Adoption Of Mobile Banking Services , 2003 .
[5] K. Bailey. Typologies and taxonomies: An introduction to classification techniques. , 1994 .
[6] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[7] Ronja Addams-Moring,et al. Public warning in the networked age , 2007, Commun. ACM.
[8] B. Faulkner. Towards a framework for tourism disaster management , 2001 .
[9] Heiko Roßnagel,et al. Mobile qualifizierte elektronische Signaturen , 2009 .
[10] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[11] Bartel Van de Walle,et al. Open source software for disaster management , 2007, Commun. ACM.
[12] Andreas Pfitzmann. Multilateral Security: Enabling Technologies and Their Evaluation , 2006, ETRICS.
[13] Stuart J. Barnes,et al. Mobile banking: concept and potential , 2003, Int. J. Mob. Commun..
[14] Tobias Scherner,et al. A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection , 2005, ICN.
[15] Marianne Swanson,et al. Security Self-Assessment Guide for Information Technology Systems , 2001 .
[16] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[17] Stuart J. Barnes,et al. The mobile commerce value chain: analysis and future developments , 2002, Int. J. Inf. Manag..
[18] Qi Li,et al. Proceedings of the International Conference on Electronic Commerce , 2005 .
[19] Szu-Yuan Sun,et al. A study of consumer value-added services in mobile commerce: focusing on domestic cellular phone companies in Taiwan, China , 2005, ICEC '05.
[20] Scott B. Guthery,et al. Mobile Application Development with SMS and the SIM Toolkit , 2001 .
[21] Günter Müller. Emerging Trends in Information and Communication Security , 2006, Lecture Notes in Computer Science.
[22] Pauline Ratnasingam,et al. A knowledge architecture for IT security , 2007, CACM.
[23] Murray Turoff,et al. Human-computer interaction , 2007, Commun. ACM.
[24] Jochen Haller,et al. Framework and Architecture for Secure Mobile Business Applications , 2003, SEC.
[25] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[26] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[27] Jun Sun,et al. Information requirement elicitation in mobile commerce , 2003, CACM.
[28] Joos Vandewalle,et al. On the Security of Today's Online Electronic Banking Systems , 2002, Comput. Secur..
[29] Angappa Gunasekaran,et al. A review for mobile commerce research and applications , 2007, Decis. Support Syst..
[30] Venkataraman Ramesh,et al. Understanding usability in mobile commerce , 2003, CACM.
[31] Pin Luarn,et al. AIS Electronic Library (AISeL) , 2017 .
[32] E.Eugene Schultz,et al. Mobile computing: The next Pandora's Box , 2007, Comput. Secur..
[33] Harold Thimbleby,et al. Proceedings of HCI on People and Computers XII , 1997 .
[34] Bart De Decker,et al. Communications and Multimedia Security , 2011, Lecture Notes in Computer Science.
[35] Bill Anckar,et al. Value-added services in mobile commerce: an analytical framework and empirical findings from a national consumer survey , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[36] Jan Muntermann,et al. Assessing Customers' Value of Mobile Financial Information Services: Empirical-Based Measures , 2005, ICIS.
[37] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[38] Günter Karjoth,et al. Access control with IBM Tivoli access manager , 2003, TSEC.
[39] Tobias Scherner,et al. Secure Mobile Notifications of Civilians in Case of a Disaster , 2006, Communications and Multimedia Security.
[40] B. S. Manoj,et al. Communication challenges in emergency response , 2007, Commun. ACM.
[41] Thomas A. Horan,et al. Time-critical information services , 2007, Commun. ACM.
[42] M.H.P. Kleijnen,et al. Consumer adoption of wireless services: Discovering the rules, while playing the game , 2004 .