Advances in Security and Payment Methods for Mobile CommerceIdea Group Incorporated, 2005 - 351 pages Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment. |
Table des matières
Chapter | 1 |
Chapter II | 19 |
Chapter III | 36 |
Droits d'auteur | |
13 autres sections non affichées
Autres éditions - Tout afficher
Expressions et termes fréquents
access control access router algorithm attack authentication protocol bank certificate chapter client commerce applications communication context Copying or distributing Copyright 2005 credentials cryptographic digital cash digital signature disclosure policies distributing in print electronic commerce electronic forms encryption environment example feedback forms without written fraud hash chain hash function Idea Group Inc IEEE implementation infrastructure intrusion detection IPSec IPv6 Java key management m-commerce malicious merchant micro-payment middleware mobile agent mobile commerce mobile device mobile networks mobile payment mobile phone mobile user multicast node operation parties payment methods payment processor payment service payment solutions peers PeerTrust perform print or electronic private key proxies public key received request requirements resource scenario SEMOPS sender sends server service provider signature scheme signed smart card transaction trust negotiation trust sequence Trust-X update verify vulnerability WICoCo wireless networks written Figure