Contents
Academic literature on the topic 'Mobile commerce security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile commerce security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile commerce security"
Lam, Kwok-Yan, Siu-Leung Chung, Ming Gu, and Jia-Guang Sun. "Lightweight security for mobile commerce transactions." Computer Communications 26, no. 18 (2003): 2052–60. http://dx.doi.org/10.1016/s0140-3664(03)00188-9.
Full textAbu-Shanab, Emad, and Osamah Ghaleb. "Adoption of Mobile Commerce Technology." International Journal of Technology Diffusion 3, no. 2 (2012): 36–49. http://dx.doi.org/10.4018/jtd.2012040104.
Full textZhang, Tao, Kun Zhao, Ming Yang, Tilei Gao, and Wanyu Xie. "Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov." Wireless Communications and Mobile Computing 2020 (July 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/8888296.
Full textJin, Min Li, Yang Cheng, and Wu Liang Peng. "Security Solution of Mobile E-Commerce Based on WAP." Applied Mechanics and Materials 16-19 (October 2009): 169–73. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.169.
Full textWang, Qin, and Huifeng Li. "Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP." International Journal of Asian Business and Information Management 6, no. 1 (2015): 51–67. http://dx.doi.org/10.4018/ijabim.2015010104.
Full textAl-Dwairi, Radwan Moh'd, Laith M. K. Al-Shraideh, and Emad A. Abu-Shanab. "Mobile Commerce Adoption From Consumers Perspective." International Journal of Information Systems and Social Change 9, no. 2 (2018): 12–27. http://dx.doi.org/10.4018/ijissc.2018040102.
Full textXu, Hongjiang. "The Effect of Perceived Security on Consumers’ Intent to Use." Journal of Electronic Commerce in Organizations 11, no. 4 (2013): 37–51. http://dx.doi.org/10.4018/jeco.2013100103.
Full textYOON, Eun-Jun, and Kee-Young YOO. "A Robust Security Mechanism for Mobile Commerce Transactions." IEICE Transactions on Information and Systems E93-D, no. 11 (2010): 2898–906. http://dx.doi.org/10.1587/transinf.e93.d.2898.
Full textGururajan, Raj. "New Financial Transaction Security Concerns in Mobile Commerce." Information & Security: An International Journal 8 (2002): 71–86. http://dx.doi.org/10.11610/isij.0803.
Full textWei, June, and Ant Ozok. "Development of a Mobile Commerce Security Analysis Method." Journal of Information Privacy and Security 5, no. 1 (2009): 28–48. http://dx.doi.org/10.1080/15536548.2009.10855856.
Full text