Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1496
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTellez, Jesees, ; author ;en_US
dc.contributor.authorZeadally, Sherali, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:15Z-
dc.date.available2020-05-17T08:29:15Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319230337 ;en_US
dc.identifier.isbn3319230336 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1496-
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJesees Tellez, Sherali Zeadallyen_US
dc.description.tableofcontents""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ;en_US
dc.description.tableofcontents""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ;en_US
dc.description.tableofcontents""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ;en_US
dc.description.tableofcontents""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ;en_US
dc.description.tableofcontents""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.haspart9783319230337.pdfen_US
dc.subjectMobile computing ;en_US
dc.subjectUbiquitous computing ;en_US
dc.subjectElectronic funds transfers ;en_US
dc.titleMobile payment systems :en_US
dc.title.alternativesecure network architectures and protocols /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.lcQA75.59 ;en_US
dc.classification.dc004 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319230337.pdf3.83 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTellez, Jesees, ; author ;en_US
dc.contributor.authorZeadally, Sherali, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:15Z-
dc.date.available2020-05-17T08:29:15Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319230337 ;en_US
dc.identifier.isbn3319230336 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1496-
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJesees Tellez, Sherali Zeadallyen_US
dc.description.tableofcontents""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ;en_US
dc.description.tableofcontents""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ;en_US
dc.description.tableofcontents""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ;en_US
dc.description.tableofcontents""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ;en_US
dc.description.tableofcontents""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.haspart9783319230337.pdfen_US
dc.subjectMobile computing ;en_US
dc.subjectUbiquitous computing ;en_US
dc.subjectElectronic funds transfers ;en_US
dc.titleMobile payment systems :en_US
dc.title.alternativesecure network architectures and protocols /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.lcQA75.59 ;en_US
dc.classification.dc004 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319230337.pdf3.83 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTellez, Jesees, ; author ;en_US
dc.contributor.authorZeadally, Sherali, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:15Z-
dc.date.available2020-05-17T08:29:15Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319230337 ;en_US
dc.identifier.isbn3319230336 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1496-
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJesees Tellez, Sherali Zeadallyen_US
dc.description.tableofcontents""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ;en_US
dc.description.tableofcontents""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ;en_US
dc.description.tableofcontents""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ;en_US
dc.description.tableofcontents""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ;en_US
dc.description.tableofcontents""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ;en_US
dc.format.extent1 online resource ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.ispartofseriesComputer communications and networks ;en_US
dc.relation.haspart9783319230337.pdfen_US
dc.subjectMobile computing ;en_US
dc.subjectUbiquitous computing ;en_US
dc.subjectElectronic funds transfers ;en_US
dc.titleMobile payment systems :en_US
dc.title.alternativesecure network architectures and protocols /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.lcQA75.59 ;en_US
dc.classification.dc004 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319230337.pdf3.83 MBAdobe PDFThumbnail
Preview File