TITLE

Security In The M-Commerce World

AUTHOR(S)
Smith, Brad
PUB. DATE
July 2001
SOURCE
Wireless Week;7/9/2001, Vol. 7 Issue 28, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the security concerns of individuals who use their mobile communication system devices to buy products on the Internet. Challenge posed by the multiplicity of communication networks that can be used in mobile commerce; Installation of encryption software in laptop computers to prevent corporate data theft; Security concerns over Wireless Application Protocol.
ACCESSION #
4800922

 

Related Articles

  • Botnet-Originated DDOS Attacks and their Mitigation.  // International Conference on Information Technology Security;2011, p6 

    The Internet has transformed how people interact and transact day-to-day activities in less than a single human generation. The rate of this transformation will only increase with the on-going innovations in mobile networks and devices. However, a limiting factor of adoption of innovation is the...

  • A Practical Attack on Mobile Data Network Using IP Spoofing. Dong W. Kang; Joo H. Oh; Chae T. Im; Wan S. Yi; Yoo J. Won // Applied Mathematics & Information Sciences;2013, Vol. 7 Issue 6, p2345 

    As the mobile Internet has become widespread in recent years, communication based on mobile networks is increasing. As a result, security threats have been posed with regard to the abnormal traffic of mobile networks, but mobile security has been handled with focus on threats posed by mobile...

  • Botnet-Originated DDOS Attacks and their Mitigation. Beckett, William; Jayawardena, Thusitha // Annual International Conference on Network Technologies & Commun;2011, p37 

    The Internet has transformed how people interact and transact day-to-day activities in less than a single human generation. The rate of this transformation will only increase with the on-going innovations in mobile networks and devices. However, a limiting factor of adoption of innovation is the...

  • Trustworthy Mobile Network Architecture Based on Locator/Identity Split. Haoxue Wang; Ke Zhu; Yuxiang Hu; Dongnian Cheng // Journal of Systems Science & Information;Mar2008, Vol. 6 Issue 1, p71 

    Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA defines a kind of network architecture with mobility and trustworthiness, based...

  • A wide-adapted bantam protocol for roaming across wireless areas. Lee, Jung-San; Tseng, Wan-Ting // Wireless Networks (10220038);Aug2013, Vol. 19 Issue 6, p1423 

    To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme...

  • A Handoff Method Based on AAA for MIPv6. Jia Zong-pu; Zhang Jing // Proceedings of the International Symposium on Computer Science &;Aug2010, Vol. 2 Issue 1, p405 

    In the era of commercial demand increased day by day, the mobile IP protocol combined with AAA (Authentication, Authorization and Accounting) technology is widely used in authentication, authorization and billing issues. However, compared to single mobile IP switch protocol, because MIPv6-AAA...

  • Analysis and Research on Secure Architecture in the Internet of Things. Xiurong Li; Shuang Zheng; Yali Liu // Applied Mechanics & Materials;2014, Vol. 687-691, p2205 

    The Internet of things is the technology extension and expansion of computer, Internet and mobile communication network. We will strongly rely on the Internet of Things in the future. The Internet of Things provides more conveniences, but it also will face more threats. In this article, we...

  • 10 tips for mobile security. Clarkin, Michael // Communications News;Jan2003, Vol. 40 Issue 1, p38 

    Offers recommendations to manage mobile user security. INSET: New WLAN security.

  • Anonymity Leakage Reduction in Network Latency. Anyanwu, Longy O.; Keengwe, Jared; Arome, Gladys // International Journal of Multimedia & Ubiquitous Engineering;2010, Vol. 5 Issue 1, p19 

    Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics