Academic literature on the topic 'Mobile commerce – Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile commerce – Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile commerce – Cryptography"
Lizama Pérez, Luis Adrián, Leonardo Javier Montiel Arrieta, Flor Seleyda Hernández Mendoza, Luis Adrián Lizama Servín, and Eric Simancas Acevedo. "Public hash signature for mobile network devices." Ingeniería Investigación y Tecnología 20, no. 2 (2019): 1–10. http://dx.doi.org/10.22201/fi.25940732e.2019.20n2.018.
Full textTan, Zuo Wen. "A Note on an Enhanced Three-Party Authentication Key Exchange Protocol." Key Engineering Materials 439-440 (June 2010): 1367–72. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1367.
Full textYang, Jen-Ho, and Chin-Chen Chang. "An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments." Journal of Systems and Software 82, no. 9 (2009): 1497–502. http://dx.doi.org/10.1016/j.jss.2009.03.075.
Full textRamasamy, Priya, Vidhyapriya Ranganathan, Venketesh Palanisamy, and Seifedine Kadry. "Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application." Multimedia Tools and Applications 79, no. 23-24 (2019): 17081–99. http://dx.doi.org/10.1007/s11042-019-7615-3.
Full textHe, Debiao, Yitao Chen, and Jianhua Chen. "An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments." Arabian Journal for Science and Engineering 38, no. 8 (2013): 2055–61. http://dx.doi.org/10.1007/s13369-013-0575-4.
Full textTso, Raylin. "Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication." Symmetry 10, no. 12 (2018): 685. http://dx.doi.org/10.3390/sym10120685.
Full textM E, Raghu, and K. C Ravishankar. "Encryption and Decryption of an Image Data – a Parallel Approach." International Journal of Engineering & Technology 7, no. 3.34 (2018): 674. http://dx.doi.org/10.14419/ijet.v7i3.34.19414.
Full textIssad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.
Full textIslam, S. K. Hafizul, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, and Saru Kumari. "An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments." Journal of King Saud University - Computer and Information Sciences 29, no. 3 (2017): 311–24. http://dx.doi.org/10.1016/j.jksuci.2015.08.002.
Full textMochammad Rizky Royani and Arief Wibowo. "Web Service Implementation in Logistics Company uses JSON Web Token and RC4 Cryptography Algorithm." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (2020): 591–600. http://dx.doi.org/10.29207/resti.v4i3.1952.
Full textDissertations / Theses on the topic "Mobile commerce – Cryptography"
Alimi, Vincent. "Contributions au déploiement des services mobiles et à l'analyse de la sécurité des transactions." Phd thesis, Caen, 2012. http://www.theses.fr/2012CAEN2061.
Full textGaber, Chrystel. "Sécurisation d'un système de transactions sur terminaux mobiles." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009369.
Full textFourati, Alia. "Approches de sécurisation pour le commerce électronique sur les réseaux mobiles." Toulouse 3, 2005. http://www.theses.fr/2005TOU30166.
Full textVan, der Merwe Pieter Ben. "Mobile commerce over GSM a banking perspective on security /." 2003. http://upetd.up.ac.za/thesis/available/etd-07202004-111814.
Full textYu, Min-Chieh. "A secure mobile agent e-commerce protocol." Thesis, 2015. http://hdl.handle.net/1805/10117.
Full textVan, der Merwe Pieter Ben. "Mobile commerce over GSM: A banking perspective on security." Diss., 2004. http://hdl.handle.net/2263/26431.
Full textBook chapters on the topic "Mobile commerce – Cryptography"
Sánchez Guerrero, Javier, Sandra Carrillo Ríos, Darwin García Herrera, and Julio Mocha-Bonilla. "Cryptographic Systems and Threats in e-Commerce." In Internet of Things, Infrastructures and Mobile Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49932-7_47.
Full textHarshita, Sarvesh Tanwar, and Sarvesh Tanwar. "Security Issues and Countermeasures of Online Transaction in E-Commerce." In Mobile Commerce. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2599-8.ch046.
Full textLeong, Leslie, and Andrzej T. Jarmoszko. "Cryptography." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch231.
Full textSamundeeswari, E. S., and F. Mary Magdalene Jane. "Mobile Code and Security Issues." In Mobile and Ubiquitous Commerce. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-366-1.ch014.
Full textHua, Feng, and Sheng-Uei Guan. "Agents and Payment Systems in E-Commerce." In Internet Commerce and Software Agents. IGI Global, 2001. http://dx.doi.org/10.4018/978-1-930708-01-3.ch017.
Full textGuan, Sheng-Uei. "E-Commerce Agents and Payment Systems." In Electronic Business. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-056-1.ch051.
Full textLin, Koong, Chad Lin, and Huei Leu. "Decision Analysis for Business to Adopt RFID." In Ubiquitous and Pervasive Computing. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.
Full textConference papers on the topic "Mobile commerce – Cryptography"
Shen, Guicheng, and Xuefeng Zheng. "Java Cryptography Architecture and Security of Electronic Commerce." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.2125.
Full textWang, T. I., K. H. Tsai, and M. C. Lee. "A two-layer cryptographic scheme for an e-service framework based on mobile agents." In IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004. IEEE, 2004. http://dx.doi.org/10.1109/eee.2004.1287294.
Full text