Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1496
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tellez, Jesees, ; author ; | en_US |
dc.contributor.author | Zeadally, Sherali, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:15Z | - |
dc.date.available | 2020-05-17T08:29:15Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319230337 ; | en_US |
dc.identifier.isbn | 3319230336 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1496 | - |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jesees Tellez, Sherali Zeadally | en_US |
dc.description.tableofcontents | ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ; | en_US |
dc.description.tableofcontents | ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ; | en_US |
dc.description.tableofcontents | ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ; | en_US |
dc.description.tableofcontents | ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ; | en_US |
dc.description.tableofcontents | ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.haspart | 9783319230337.pdf | en_US |
dc.subject | Mobile computing ; | en_US |
dc.subject | Ubiquitous computing ; | en_US |
dc.subject | Electronic funds transfers ; | en_US |
dc.title | Mobile payment systems : | en_US |
dc.title.alternative | secure network architectures and protocols / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA75.59 ; | en_US |
dc.classification.dc | 004 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319230337.pdf | 3.83 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tellez, Jesees, ; author ; | en_US |
dc.contributor.author | Zeadally, Sherali, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:15Z | - |
dc.date.available | 2020-05-17T08:29:15Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319230337 ; | en_US |
dc.identifier.isbn | 3319230336 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1496 | - |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jesees Tellez, Sherali Zeadally | en_US |
dc.description.tableofcontents | ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ; | en_US |
dc.description.tableofcontents | ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ; | en_US |
dc.description.tableofcontents | ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ; | en_US |
dc.description.tableofcontents | ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ; | en_US |
dc.description.tableofcontents | ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.haspart | 9783319230337.pdf | en_US |
dc.subject | Mobile computing ; | en_US |
dc.subject | Ubiquitous computing ; | en_US |
dc.subject | Electronic funds transfers ; | en_US |
dc.title | Mobile payment systems : | en_US |
dc.title.alternative | secure network architectures and protocols / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA75.59 ; | en_US |
dc.classification.dc | 004 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319230337.pdf | 3.83 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tellez, Jesees, ; author ; | en_US |
dc.contributor.author | Zeadally, Sherali, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:15Z | - |
dc.date.available | 2020-05-17T08:29:15Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319230337 ; | en_US |
dc.identifier.isbn | 3319230336 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1496 | - |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jesees Tellez, Sherali Zeadally | en_US |
dc.description.tableofcontents | ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ; | en_US |
dc.description.tableofcontents | ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ; | en_US |
dc.description.tableofcontents | ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ; | en_US |
dc.description.tableofcontents | ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ; | en_US |
dc.description.tableofcontents | ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.ispartofseries | Computer communications and networks ; | en_US |
dc.relation.haspart | 9783319230337.pdf | en_US |
dc.subject | Mobile computing ; | en_US |
dc.subject | Ubiquitous computing ; | en_US |
dc.subject | Electronic funds transfers ; | en_US |
dc.title | Mobile payment systems : | en_US |
dc.title.alternative | secure network architectures and protocols / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
dc.classification.lc | QA75.59 ; | en_US |
dc.classification.dc | 004 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319230337.pdf | 3.83 MB | Adobe PDF | Preview File |