Sciweavers

17 search results - page 3 / 4
» Authentication and Payment in Future Mobile Systems
Sort
View
IACR
2011
292views more  IACR 2011»
12 years 7 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
GLOBECOM
2008
IEEE
14 years 1 months ago
Impact of Mobility on the Behavior of Interference in Cellular Wireless Networks
In this study, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the upl...
Serhan Yarkan, Amine Maaref, Koon Hoo Teo, Hü...
MSWIM
2006
ACM
14 years 1 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
CIA
1998
Springer
13 years 11 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
WER
2001
Springer
13 years 12 months ago
Requirements Elicitation Using a Combination of Prototypes and Scenarios
A survey of different types of prototypes and current prototyping methods is presented. Especially the usage of prototypes with use cases and scenarios is investigated, and an appr...
Markus Mannio, Uolevi Nikula