Consumer-perceived risk in e-commerce transactions
Communications of the ACM - Mobile computing opportunities and challenges
A New Era of Presidential Security: The President and His BlackBerry
Computing in Science and Engineering
Why spyware poses multiple threats to security
Communications of the ACM - Spyware
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Proceedings of the 5th annual conference on Information security curriculum development
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
A review of security attacks on the GSM standard
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
A botnet-based command and control approach relying on swarm intelligence
Journal of Network and Computer Applications
SecureSMS: A secure SMS protocol for VAS and other applications
Journal of Systems and Software
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.00 |
Despite the promising start, Electronic Commerce has not taken off mostly because of security issues with the communication infrastructures that are popping up threateningly undermining the perceived trustworthiness in Electronic Commerce. Some Internet security issues, like malware, phishing, pharming are well known to the Internet community. Such issues are being, however, transferred to the telephone networks thanks to the symbiotic relation between the two worlds. Such an interconnection is becoming so pervasive that we can really start thinking about a unique network, which, in this paper, we refer to as the Interphonet. The main goal of this paper is to analyze some of the Internet security issues that are being transferred to the Interphonet and also to identify new security issues of the Interphonet. In particular we will discuss about mobile phones malware and identity theft, phishing with SMS, telephone pharming, untraceability of phone calls that use VoIP and Caller ID spoofing. We will also briefly discuss about countermeasures.