Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A proxy architecture to enhance the performance of WAP 2.0 by data compression
EURASIP Journal on Wireless Communications and Networking - Special issue on optical wireless communications
Proceedings of the 2006 international conference on Wireless communications and mobile computing
The Security Hole in WAP: An Analysis of the Network and Business Rationales Underlying a Failure
International Journal of Electronic Commerce
International Journal of Web and Grid Services
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs
Computer Communications
Hi-index | 0.00 |
The perceived lack of security in the wireless environmenthas delayed many initiatives in providing access to e-commerceapplications from wireless devices. Manyorganizations are skeptical that the same kind of securityprotections that they are used to in the current Internet(wired) e-commerce environment are also available forwireless transactions. In this paper we will show that theseperceptions are misplaced. We describe the securityproperties and mechanisms available for Internet (wired),WAP based and iMode e-commerce. We find that bothWAP and iMode provide excellent security features andare geared to provide other security provisions over andabove those commonly available in a wired environment.