Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
interactions
Fundamental challenges in mobile computing
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Journal of Theoretical and Applied Electronic Commerce Research
International Journal of Web and Grid Services
New E-Payment Scenarios in an Extended Version of the Traditional Model
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
A scalable testing framework for location-based services
Journal of Computer Science and Technology
A secure payment protocol for restricted connectivity scenarios in M-commerce
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
Payment in a kiosk centric model with mobile and low computational power devices
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Data-minimizing authentication goes mobile
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
M-commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area--and the rapidness with which it is emerging--makes it diffcult to analyze the technological problems that m-commerce introduces--and, in particular, the security and privacy issues. This situation is not good, since history has shown that security is very diffcult to retro-fit into deployed technology, and pervasive m-commerce promises (threatens?) to permeate and transform even more aspects of life than e-commerce and the Internet has. In this paper, we try to begin to rectify this situation: we offer a preliminary taxonomy that unifies many proposed m-commerce usage scenarios into a single framework, and then use this framework to analyze security issues.