Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Security & Privacy for E-Business
Security & Privacy for E-Business
Professional WAP
Hand-held computers can be better smart cards
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Security for Distributed E-Service Composition
TES '01 Proceedings of the Second International Workshop on Technologies for E-Services
Distributed PIN verification scheme for improving security of mobile devices
Mobile Networks and Applications - Security in mobile computing environments
Adaptive interfaces and agents
The human-computer interaction handbook
A security model for distributed computing
Journal of Computing Sciences in Colleges
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Location management for mobile commerce applications in wireless Internet environment
ACM Transactions on Internet Technology (TOIT)
Designing mobile commerce applications
Communications of the ACM - Mobile computing opportunities and challenges
The value of mobile applications: a utility company study
Communications of the ACM - Medical image modeling
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
Entrepreneurship in mobile application development
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
The Role of Context in m-Commerce and the Personalization Dimension
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A review for mobile commerce research and applications
Decision Support Systems
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
Barriers to mobile commerce adoption: an analysis framework for a country-level perspective
International Journal of Mobile Communications
Exploring m-commerce in terms of viability, growth and challenges
International Journal of Mobile Communications
The mobile service industry: strategic challenges and future business models
International Journal of Mobile Communications
An onion ring framework for developing and assessing mobile commerce security
International Journal of Mobile Communications
Wireless in the enterprise: requirements, solutions and research directions
International Journal of Mobile Communications
A framework for mobile business applications
International Journal of Mobile Communications
International Journal of Mobile Communications
Towards an appropriate business model for m-commerce
International Journal of Mobile Communications
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Mobile commerce adoption in China and the United States: a cross-cultural study
ACM SIGMIS Database
Conceptualising fun in mobile commerce environments
International Journal of Mobile Communications
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Security considerations in m-learning: threats and countermeasures
Advanced Technology for Learning
A semantic data validation service for web applications
Journal of Theoretical and Applied Electronic Commerce Research
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Initial trust and adoption of mobile brokerage service
International Journal of Mobile Communications
Towards high-quality mobile applications by a systematic integration of patterns
Journal of Mobile Multimedia
The role of inter-channel trust transfer in establishing mobile commerce trust
Electronic Commerce Research and Applications
Efficient scheme of verifying integrity of application binaries in embedded operating systems
The Journal of Supercomputing
Assessment of palm OS susceptibility to malicious code threats
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
International Journal of Mobile Communications
An integrated adoption model for mobile services
International Journal of Mobile Communications
Applying the technology acceptance model to the introduction of mobile voting
International Journal of Mobile Learning and Organisation
Privacy disclosure risk: smartphone user guide
International Journal of Mobile Network Design and Innovation
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
International Journal of Human-Computer Studies
Journal of Electronic Commerce in Organizations
Hi-index | 48.22 |