Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
M-Business: The Race to Mobility
M-Business: The Race to Mobility
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Survivable mobile phone network architectures: models and solution methods
IEEE Communications Magazine
Past, present and future of mobile payments research: A literature review
Electronic Commerce Research and Applications
Utilizing national public-key infrastructure in mobile payment systems
Electronic Commerce Research and Applications
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
Research of multi- interface data encryption equipment based on mobile terminal
CISST'09 Proceedings of the 3rd WSEAS international conference on Circuits, systems, signal and telecommunications
Towards an understanding of the consumer acceptance of mobile wallet
Computers in Human Behavior
Exploring user acceptance of WAP services from the perspectives of perceived value and trust
International Journal of Information Technology and Management
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Modeling users' acceptance of mobile services
Electronic Commerce Research
Designing digital payment artifacts
Proceedings of the 14th Annual International Conference on Electronic Commerce
International Journal of Asian Business and Information Management
International Journal of Asian Business and Information Management
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology
Electronic Commerce Research
The prediction of network efficiency in the smart grid
Electronic Commerce Research
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
We are now entering the mobile/wireless era. The key message of this era appears to be “anywhere–anytime” communication and transferring of data or information. While this sounds very simple, many technological considerations need to be examined in order to actualize such a message. Integral to enabling “anywhere–anytime” communication and transmission of data and information is a sound secure system. Hence a robust trust model in any mobile transaction becomes significant. This paper discusses the issue of such a trust model and outlines its key components.