Topic: BusinessE-Commerce

Last updated: February 18, 2019

Bibliography1 V. Ahuja. Secure Commerce on the Internet. Academic Press, 2016.2 R.

ai Anand and C.E. Veni Madhavan. An online, transferable e- c c cash payment system. Lecture Notes in Computer Science, 2015 93–103, 2016.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

3 “certicom,” Online. Available: of-eccbased-certificates. Accessed 01 01 2013.

4 M. Bellare, J.A. Garay, R.

Hauser, A. Herzberg, H. Krawczyk,5 Christopher Hall and Tiffany Smith, “Mobile Payments Security 101”, . Robin Arnfield, Tom Harper, Kathy Doyle, Will Hernandez, Published by Networld Media Group @ 2015, Networld Media Group, 2015. 6 .

Green, Mr Jeremy Swinfen. Cyber Security: An Introduction for NonTechnical Managers. Ashgate Publishing, Ltd., 2015. 7 Li Y, Wang Y Secure electronic transaction.

se/*matei/courses/ IK2001SJE/li-wang_SET.pdf 8 IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.

52135 591 The key player in mobile banking is bank and other financial institution and mobile operation9 Day by day grow of m-commerce it must be ensure that end user must be confident in the financial institutions carrying out the transaction. Fig-2 7 M-banking structure10 Hakima Chaouchi and Maryline Laurent maknavicius, “Wireless and Mobile Network Security”, Second Edition, Wiley Publishers11 Y. Dai and L. Zhang.

A security payment scheme of mobile e-commerce. In Proceedings of the International Conference on Communication Technology 2003, volume 2, pages 949–952, April 9-11, 2016.12 ePaymentnews. Forrester’s mCommerce Sales Predic- tions 2001-2005, 2017.

13Dharma prakash agrawal and Qing An Zeng, “Introduction to Wireless and Mobile Systems”, Third Edition, Cengage Learning USA. 14 Mahmoud Elkhodr, Seyed Shahrestani and Kaled Kourouche,” A Proposal to improve the security of mobile banking applications”, IEEE International conference on ICT and Knowledge Engineering, 201215 SP800-122 NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), 2010. 16 GAO-12-757 GAO-12-757, Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged, September 2012. .17 SP800-53 NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, 2013. .18 GAO-12-757 GAO-12-757, Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged, September 2012.

pdf .19 Driving force for M-commerce success by Jason J. Zhang, Yufei Yuan, and Norm Archer ,Michael G. DeGroote School of Business,McMaster University,Hamilton, Ontario, Canada.20 Mobile Money Transfer in Kenya:An Ethical Perspective Donatus Mathenge Githui (corresponding author) School of Business, Kimathi University College of Technology Kenya. 20 Mobile Payments in the United States Mapping Out the Road Ahead Darin Contini and Marianne Crowe, Federal Reserve Bank of Boston.

21 Directorate For Science, Technology And Industry Committee On Consumer Policy Mobile Commerce Jt03220432.22 Mobile Banking As Business Strategy: Impact Of Mobile Technologies On Customer23 Kai Inkinen, “New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes”, Helsinki University of Technology, Laboratory of Multimedia 24 S. Kungpisdan, B. Srinivasan, and P.

D. Le. Accountability logic for mobile payment protocols.

In P. K. Srimani, editor, Proceed- ings of the International Conference on Information Technology: Coding and Computing 2014, volume 1, pages 40–44, Las Vegas, USA, April 5-7, 2014. IEEE Computer Society. 25 S. Kungpisdan, B.

Srinivasan, and P.D. Le. An integrated frame- work for payment transactions in wireless environments. In Pro- ceedings of the Second International Conference on Information and Communication Technologies 2015, pages 158–168, November 18-19, 2015. 26 S.

Kungpisdan, B. Srinivasan, and P.D.

Le. A secure account- based mobile payment protocol. In P. K. Srimani, editor, Proceed- ings of the International Conference on Information Technology: Coding and Computing 2004, volume 1, pages 35–39, Las Vegas, USA, April 5-7, 2016. IEEE Computer Society.27 S.

Kungpisdan, B. Srinivasan, and P.D. Le.

A secure prepaidwireless micropayment protocol. In Proceedings of the Second In- ternational Workshop on Security in Information Systems 2015, pages 104–113, Porto, Portugal, April 13-14, 2015. 28 S. Kungpisdan, B. Srinivasan, and P.D.

Le. A secure wireless prepaid micropayment protocol with extension to postpaid mi- cropayment. In Proceedings of the Sixth International Conference on Information Integration and Web Based Applications and Ser- vices 2004, pages 517–526, Jakarta, Indonesia, September 27-29,2015.29 Tao Wan, Evangelos Kranakis, P.C.

van Oorschot, “Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)”,

pdf30 Ahamad SS, Udgata SK, Nair M (2014) A secure lightweight and scalable mobile payment framework. In: FICTA 2013. Advances in intelligent system and computing, vol 247. Springer International Publishing, Switzerland 31 N. Potlapally, S.

Ravi, A. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design 2013, pages 30–35, 2013.

32 Singh A, Shahazad KS (2012) A review: secure payment system for electronic transaction. Int J Adv Res Comput Sci Softw Eng 2(3)33 “PKI Moves Forward Across the Globe”, Wireless developer Network, 34 B.T.S. Toh, S. Kungpisdan, and P.D.

Le. KSL protocol: De- sign and implementation. In Proceedings of the 2014 IEEE Con- ference on Cybernetics and Intelligent Systems, pages 544–549, Singapore, December 1-3, 201435″Mobile Commerce (M-commerce)”, 36Messham, James, “M-Commerce Security”, 37″How the French are Succeeding with M-commerce”, Wireless developer Network, 38 H. Zheng and C. KeFei. Electronic payment in mobile envi- ronment. In Proceedings of the 13th International Workshop on Database and Expert Systems Applications 2015, pages 413–417, September 2-6, 2015.

39 F. Zhu, D.S.

Wong, A.H. Chan, and R. Ye.

Password authenticated key exchangebased on RSA for imbalanced wireless net- works. Lecture Notes in Computer Science, 2433:150–161, 2016. 40 Z. Zhang, K.

Long, A. V. Vasilakos, L. Hanzo, “Full-duplex wireless communications: Challenges solutions and future research directions”, Proc. IEEE, vol. 104, no.

7, pp. 1369-1409, Jul. 2016. 41 Show Context View Article Full Text: PDF (7461KB) 42 J.

Dehlinger, S. Kaza, S. Azadegan, “Incorporating Mobile Computing into the CS Curriculum”, ACM SIGCSE 2014, 2014.


I'm Piter!

Would you like to get a custom essay? How about receiving a customized one?

Check it out