Facilitating conditions, wireless trust and adoption intention

J Lu, CS Yu, C Liu - Journal of Computer Information Systems, 2005 - Taylor & Francis
For wireless Internet services via mobile technology (WIMT), are there any unique
determinants for user acceptance of this technology innovation? Based on literature review …

SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems

MK Yoon, S Mohan, J Choi, JE Kim… - 2013 IEEE 19th Real …, 2013 - ieeexplore.ieee.org
Security violations are becoming more common in real-time systems-an area that was
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …

A multi-factor security protocol for wireless payment-secure web authentication using mobile devices

A Tiwari, S Sanyal, A Abraham, SJ Knapskog… - arXiv preprint arXiv …, 2011 - arxiv.org
Previous Web access authentication systems often use either the Web or the Mobile channel
individually to confirm the claimed identity of the remote user. This paper proposes a new …

An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1

MLM Kiah, MS Nabi, BB Zaidan, AA Zaidan - Journal of medical systems, 2013 - Springer
This study aims to provide security solutions for implementing electronic medical records
(EMRs). E-Health organizations could utilize the proposed method and implement …

Secure multi-purpose mobile-banking using elliptic curve cryptography

S Ray, GP Biswas, M Dasgupta - Wireless Personal Communications, 2016 - Springer
Mobile technology and its applications now a day are considered to be a key note in
banking sector. This has become possible due to mobile phone based suitable banking …

A decision support system for telemedicine through the mobile telecommunications platform

A Eren, A Subasi, O Coskun - Journal of Medical Systems, 2008 - Springer
In this paper we have discussed the application of artificial intelligence in telemedicine using
mobile device. The main goal of our research is to develop methods and systems to collect …

Secure data storage for mobile data collection systems

S Gejibo, F Mancini, KA Mughal, RAB Valvik… - Proceedings of the …, 2012 - dl.acm.org
Wireless network infrastructures, notably cellular networks, are becoming a vital element for
exchanging electronic data in low income countries. Several key sectors are already …

A secure energy-efficient m-banking application for mobile devices

MD Cano, G Domenech-Asensi - Journal of Systems and Software, 2011 - Elsevier
Mobile banking is one of the emerging services in telecommunications due to the explosive
increase in the number of mobile customers around the world. Solutions for mobile banking …

Mobile commerce: issues and obstacles

A Gunasekaran… - International Journal of …, 2009 - inderscienceonline.com
Mobile Commerce (M-Commerce) is any direct or indirect transaction conducted and
facilitated through a wireless telecommunication network. M-commerce technologies have …

A multifactor secure authentication system for wireless payment

S Sanyal, A Tiwari, S Sanyal - Emergent web intelligence: Advanced …, 2010 - Springer
Organizations are deploying wireless based online payment applications to expand their
business globally, it increases the growing need of regulatory requirements for the …