Mobile payment systems : secure network architectures and protocols /: secure network architectures and protocols. (2017)
- Record Type:
- Book
- Title:
- Mobile payment systems : secure network architectures and protocols /: secure network architectures and protocols. (2017)
- Main Title:
- Mobile payment systems : secure network architectures and protocols
- Further Information:
- Note: Jesús Téllez, Sherali Zeadally.
- Authors:
- Téllez, Jesús, 1970-
Zeadally, Sherali - Contents:
- ""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric""Preface""; ""Contents""; ""1 Introduction""; ""1.1 Electronic Money""; ""1.1.1 Advantages and Disadvantages of Electronic Money""; ""1.1.2 Characteristics of Electronic Money""; ""1.2 Electronic Commerce""; ""1.3 Mobile Commerce""; ""1.4 Mobile Payment""; ""1.4.1 Mobile Payment Characteristics""; ""1.4.2 Existing Mobile Payment Methods""; ""1.4.2.1 Basis of Payment""; ""1.4.2.2 Timing of Payment""; ""1.4.2.3 Medium of Payment""; ""1.4.2.4 Payment Amount""; ""1.4.2.5 Location of Payment""; ""1.4.3 Mobile Payment Stakeholders""; ""1.4.4 Technologies for Mobile Payments"" ""1.5 Mobile Payment System (MPS)""""1.5.1 Entities""; ""2 Mobile Device Security""; ""2.1 Mobile Devices""; ""2.1.1 Classification of Mobile Devices""; ""2.1.2 Mobile Operating Systems (Mobile OSs)""; ""2.2 Mobile Device Security""; ""2.2.1 Mobile Device Security Versus PersonalComputer Security""; ""2.2.2 Threat Model""; ""2.2.2.1 Targets for Mobile Device""; ""2.2.2.2 Adversaries""; ""2.2.2.3 Attack Vectors""; ""2.2.3 Mobile Malware""; ""2.2.4 Security Solutions for Mobile Devices""; ""2.2.4.1 Intrusion Detection Systems""; ""2.2.4.2 Trusted Mobile"" ""3 Architectures and Models for Mobile Payment Systems""""3.1 Classifications of Mobile Payment Models: State of the Art""; ""3.1.1 Micro-payments""; ""3.1.2 Cryptographic Technique""; ""3.1.2.1 Asymmetric Cryptographic""; ""3.1.2.2 Symmetric Cryptographic""; ""3.1.3 Technology Used""; ""3.1.3.1 Short Message Service (SMS)""; ""3.1.3.2 Biometric Technology""; ""3.1.3.3 Radio-Frequency Identification (RFID) Technology""; ""3.1.3.4 Near Field Communication (NFC)""; ""3.1.3.5 2-D Barcode Technology""; ""3.1.3.6 Peer-to-Peer (P2P) Technology""; ""3.1.4 Session Initiation Protocol (SIP)"" ""3.1.5 Communication Restriction""""3.1.6 Mobile Agent Technology""; ""3.1.7 Wireless Application Protocol (WAP)""; ""4 Security in Mobile Payment Systems""; ""4.1 Security Requirements""; ""4.2 Basic Concepts in Cryptography""; ""4.2.1 Secure Sockets Layer (SSL)""; ""4.2.2 Symmetric Cryptography""; ""4.2.2.1 Message Authentication Code (MAC)""; ""4.2.3 Public Key Cryptography""; ""4.2.3.1 Digital Signatures""; ""4.2.3.2 Certificate Authorities""; ""4.2.4 Elliptic Curve Cryptography""; ""4.2.5 Self-Certified Public Keys"" ""4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions""""4.3 Security and Constraints of Mobile Payment Systems""; ""4.3.1 Constraint of Wireless Environments""; ""4.3.1.1 Resource Limitations of Mobile Devices""; ""4.3.2 Characteristics of Wireless Networks""; ""5 Future Challenges and Opportunities""; ""Bibliography"" … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 004
Computer science
Mobile computing
Ubiquitous computing
Electronic funds transfers
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Electronic funds transfers
Mobile computing
Ubiquitous computing
Technology & Engineering -- Telecommunications
Communications engineering / telecommunications
Computer Communication Networks
Telecommunication
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books - Languages:
- English
- ISBNs:
- 9783319230337
3319230336 - Related ISBNs:
- 9783319230320
3319230328 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed October 17, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.354947
- Ingest File:
- 01_314.xml