Facilitating conditions, wireless trust and adoption intention
For wireless Internet services via mobile technology (WIMT), are there any unique
determinants for user acceptance of this technology innovation? Based on literature review …
determinants for user acceptance of this technology innovation? Based on literature review …
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Security violations are becoming more common in real-time systems-an area that was
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …
A multi-factor security protocol for wireless payment-secure web authentication using mobile devices
A Tiwari, S Sanyal, A Abraham, SJ Knapskog… - arXiv preprint arXiv …, 2011 - arxiv.org
Previous Web access authentication systems often use either the Web or the Mobile channel
individually to confirm the claimed identity of the remote user. This paper proposes a new …
individually to confirm the claimed identity of the remote user. This paper proposes a new …
An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1
This study aims to provide security solutions for implementing electronic medical records
(EMRs). E-Health organizations could utilize the proposed method and implement …
(EMRs). E-Health organizations could utilize the proposed method and implement …
Secure multi-purpose mobile-banking using elliptic curve cryptography
Mobile technology and its applications now a day are considered to be a key note in
banking sector. This has become possible due to mobile phone based suitable banking …
banking sector. This has become possible due to mobile phone based suitable banking …
A decision support system for telemedicine through the mobile telecommunications platform
In this paper we have discussed the application of artificial intelligence in telemedicine using
mobile device. The main goal of our research is to develop methods and systems to collect …
mobile device. The main goal of our research is to develop methods and systems to collect …
Secure data storage for mobile data collection systems
S Gejibo, F Mancini, KA Mughal, RAB Valvik… - Proceedings of the …, 2012 - dl.acm.org
Wireless network infrastructures, notably cellular networks, are becoming a vital element for
exchanging electronic data in low income countries. Several key sectors are already …
exchanging electronic data in low income countries. Several key sectors are already …
A secure energy-efficient m-banking application for mobile devices
MD Cano, G Domenech-Asensi - Journal of Systems and Software, 2011 - Elsevier
Mobile banking is one of the emerging services in telecommunications due to the explosive
increase in the number of mobile customers around the world. Solutions for mobile banking …
increase in the number of mobile customers around the world. Solutions for mobile banking …
Mobile commerce: issues and obstacles
A Gunasekaran… - International Journal of …, 2009 - inderscienceonline.com
Mobile Commerce (M-Commerce) is any direct or indirect transaction conducted and
facilitated through a wireless telecommunication network. M-commerce technologies have …
facilitated through a wireless telecommunication network. M-commerce technologies have …
A multifactor secure authentication system for wireless payment
S Sanyal, A Tiwari, S Sanyal - Emergent web intelligence: Advanced …, 2010 - Springer
Organizations are deploying wireless based online payment applications to expand their
business globally, it increases the growing need of regulatory requirements for the …
business globally, it increases the growing need of regulatory requirements for the …