Software security and privacy risks in mobile e-commerce
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Mobile Application Development with SMS and the Sim Toolkit
Mobile Application Development with SMS and the Sim Toolkit
Making Passwords Secure and Usable
HCI 97 Proceedings of HCI on People and Computers XII
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 3 - Volume 3
Information requirement elicitation in mobile commerce
Communications of the ACM - Mobile computing opportunities and challenges
Understanding usability in mobile commerce
Communications of the ACM - Mobile computing opportunities and challenges
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
A review for mobile commerce research and applications
Decision Support Systems
Time-critical information services
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Communication challenges in emergency response
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Public warning in the networked age: open standards to the rescue?
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Open source software for disaster management
Communications of the ACM - Emergency response information systems: emerging trends and technologies
A knowledge architecture for IT security
Communications of the ACM - Creating a science of games
Mobile banking: concept and potential
International Journal of Mobile Communications
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Secure mobile notifications of civilians in case of a disaster
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
The mobile commerce value chain: analysis and future developments
International Journal of Information Management: The Journal for Information Professionals
A mobile network operator-independent mobile signature service
Journal of Network and Computer Applications
Hi-index | 0.00 |
We address inhibiting factors of mobile real-time services. Since research provides evidence that perceived risk is one major inhibiting factor for the adoption of mobile services, we explore current approaches that should safeguard existing security requirements. First, we develop a classification scheme of mobile real-time applications. We then empirically explore practical and security requirements for the different service classes. Our analysis indicates that current implementation concepts do not meet existent service requirements. Therefore, we present an alternative approach on the basis of SIM-based security tokens. The additional functionalities provided by these tokens can overcome functional or security constraints of existing implementations.