Sciweavers

80 search results - page 10 / 16
» Mobile Payments
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
DPD
2000
71views more  DPD 2000»
14 years 11 months ago
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Most of the current Internet trading frameworks, in particular their negotiation and payment phases, are intended for customers frequently connected to the Internet during an entir...
Xun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Oka...
IACR
2011
292views more  IACR 2011»
13 years 11 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
15 years 4 months ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
INFOCOM
2010
IEEE
14 years 10 months ago
MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network
When Disruption Tolerant Network (DTN) is used in commercial environments, incentive mechanism should be employed to encourage cooperation among selfish mobile users. Key challen...
Bin Bin Chen, Mun Choon Chan