Coverart for item
The Resource Mobile payment systems : secure network architectures and protocols, Jesús Téllez, Sherali Zeadally

Mobile payment systems : secure network architectures and protocols, Jesús Téllez, Sherali Zeadally

Label
Mobile payment systems : secure network architectures and protocols
Title
Mobile payment systems
Title remainder
secure network architectures and protocols
Statement of responsibility
Jesús Téllez, Sherali Zeadally
Creator
Contributor
Subject
Language
eng
Member of
http://library.link/vocab/creatorName
Téllez, Jesús,
Dewey number
004
Index
no index present
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Zeadally, Sherali,
Series statement
Computer communications and networks
http://library.link/vocab/subjectName
  • Mobile computing
  • Ubiquitous computing
  • Electronic funds transfers
Label
Mobile payment systems : secure network architectures and protocols, Jesús Téllez, Sherali Zeadally
Instantiates
Publication
Antecedent source
unknown
Color
multicolored
Contents
  • ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments""
  • ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile""
  • ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)""
  • ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys""
  • ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography""
Control code
on1005354010
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9783319230337
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1005354010
Label
Mobile payment systems : secure network architectures and protocols, Jesús Téllez, Sherali Zeadally
Publication
Antecedent source
unknown
Color
multicolored
Contents
  • ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments""
  • ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile""
  • ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)""
  • ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys""
  • ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography""
Control code
on1005354010
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9783319230337
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1005354010

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...