Limit search to available items
Book Cover
Book
Author Hu, Wen Chen, 1960-

Title Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors
Published Hershey PA : Idea Group Inc., [2005]
©2005

Copies

Location Call no. Vol. Availability
 MELB  658.478 Kou/Ais  AVAILABLE
Description xi, 351 pages : illustrations ; 27 cm
Contents Machine derived contents note: Table of Contents -- Preface -- Section 1: -- Fundamentals of Mobile Commerce Security and Payment Methods -- Mobile Commerce Security and Payment Methods -- Introduction -- Mobile Commerce Security -- Mobile Commerce Payment Methods -- Summary -- Chung-wei Lee, Auburn University, USA -- Weidong Kou, Chinese State Key Laboratory of Integrated Service Networks, China -- Wen-Chen Hu, University of North Dakota, USA -- Chapter 2. -- Reputation and Trust -- Introduction -- The Trust Model -- Evaluation -- Conclusion and Future Trends -- Li Xiong, Georgia Institute of Technology, USA -- Ling Liu, Georgia Institute of Technology, USA -- Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform -- Introduction -- Intrusion Detection -- Vulnerability Analysis -- Distributed Wireless Intrusion Detection & Vulnerability Analysis (WID&VA) System -- Conclusion and Future Trends -- Changhua Zhu, Xidian University, China -- Changxing Pei, Xidian University, China -- A Secure Authentication Infrastructure for Mobile Users -- Introduction -- Requirements for Authentication Infrastructure -- Review of Authentication Methods -- Password-Based Authentication for Mobile Users with Support for Public Key Technology -- Concluding Discussion -- Gregor v. Bochmana, University of Ottawa, Canada -- Eric Zhang, University of Ottawa, Canada -- Section 2: -- Mobile Commerce Security -- Policy-based Access Control for Context-aware Services over the Wireless Internet -- Introduction -- Context-aware Service Provisioning over the Wireless Internet -- Context-aware Access Control: Requirements and Solution Guidelines -- The WICoCo Middleware -- The Mobile Stock Trading Case Study -- Related Work -- Lessons Learned and Concluding Remarks -- Paolo Bellavista, University of Bologna, Italy -- Antonio Corradi, University of Bologna, Italy -- Cesare Stefanelli, University of Ferrara, Italy -- A Comprehensive XML Based Approach to Trust Negotiations -- Introduction -- Trust Negotiation: Basic Concepts -- Trust-x : A Comprehensive Framework for Trust Negotiations -- An Example of Trust Negotiation -- The x-TNL Trust Negotiation Language -- Trust-x Negotiations -- Related Work -- Mobile Commerce with Trust-x -- Conclusions and Future Research Directions -- Elisa Bertino, Purdue University, USA -- Elena Ferrari, Universit degli Studi dellíInsubria, Italy -- Anna Cinzia Squicciarini, Universit degli Studi di Milano, Italy -- Security Issues and their Possible Countermeasures for a Mobile Agent Based Mobile Commerce Application -- Introduction -- On-Line Business Model -- E-Commerce Approach I: SET Protocol -- E-Commerce Approach II: Digital Cash -- Mobile Agent Technology -- The Use of Mobile Agents for Mobile Commerce -- Conclusions -- Jyh-hHaw Yeh -- Boise State University -- Wen-cChen Hu -- University of North Dakota -- Chung-Wei Lee -- Auburn University -- Jyh-haw Yeh, Boise State University, USA -- Wen-Chen Hu, University of North Dakota, USA -- Chung-wei Lee, Auburn University, USA -- Secure Multicast for Mobile Commerce Applications: Issues and Challenges -- Introduction -- Dimensions of Secure Mobile Commerce -- M-Commerce Multicast Security Requirements -- Security Attacks in M-Commerce Environments -- Core Services for Efficient Secure Multicast in M-Commerce -- Multicast Routing -- Multicast Authentication -- Multicast Key Management -- Example Revisited -- Conclusion -- Sushil Jajodia, George Mason University, USA -- Mohamed Eltoweissy, Virginia Tech, USA -- Ravi Mukkamala, Old Dominion University, USA -- Section 3: -- Mobile Commerce Payment Methods -- M-Payment Solutions and M-Commerce Fraud Management -- Introduction -- Mobile Payment Systems or Solutions -- Fraud Management Systems in M-Commerce -- Research Issues and Conclusions -- Seema Nambiar, Virginia Tech, USA -- Chang-Tien Lu, Virginia Tech, USA -- Multi-party Micro-payment for Mobile Commerce -- Introduction -- Related Works -- A Multi-party Micro-payment Scheme for Mobile Commerce -- Conclusion and Future Works -- Jianming Zhu, Xidian University, China -- Jianfeng Ma, Xidian University, China -- SeMoPS: A Global Secure Mobile Payment Service -- Introduction -- Mobile Payment Solutions -- SEMOPS Transaction Architecture and Flow -- SEMOPS Front-End Infrastructure -- Applications and Business Scenarios -- SEMOPS Business Model -- Evaluation of the SEMOPS Approach -- Conclusions -- Stamatis Karnouskos, Fraunhofer Institute FOKUS, Germany -- Andr·s Vilmos, SafePay Systems Ltd, Hungary -- Antonis Ramfos, Intrasoft International, Greece -- Bal·zs Csik, ProfiTrade 90 Ltd, Hungary -- Petra Hoepner, Fraunhofer Institute FOKUS, Germany -- Section 4: -- Ad Hoc Mobile Commerce Security and Payment Methods -- Remote Digital Signing for Mobile Commerce -- Introduction -- Background -- The Multi-Agent Model -- Multiple Cryptography -- Key Splitting and Signature Generation -- Overall System for Remote Digital Signing -- Using Limited-Liability Keys and Public Key Certificates -- Practical Issues of Remote Digital Signing -- Conclusion -- O. Kaan Onbilger, University of Florida, USA -- Randy Chow, University of Florida, USA -- Richard Newman, University of Florida, USA -- A Mobile Coalition Key-evolving Digital Signature Scheme Wireless/Mobile Networks -- Introduction -- The Definition of MCKE -- Construction of the MCKE -- Applicationof MCKE Scheme -- Security of MCKE Scheme -- Conclusion -- Quanxing Zhang, Auburn University, USA -- Chwan-Hwa ìJohnî Wu, Auburn University, USA -- J. David Irwin, Auburn University, USA -- Smart Card Based Protocol for Secure and Controlled Access of Mobile Host in IPv6 Compatible Foreign Network -- Introduction -- Smart Cards -- AAA Architecture -- Network Layer Security Using IPv6 -- User Registration Protocol -- Protocol Overview -- Protocol Specification -- Implementation Details -- Conclusions -- R. K. Ghosh, Indian Institute of Technology, Kanpur, India -- Abhinav Arora, Indian Institute of Technology, Guwahati, India -- Gautam Barua, Indian Institute of Technology, Guwahati, India -- About the EditorsAbout the AuthorsIndex
Summary "Advances in Security and Payment Methods for Mobile Commerce covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment."--BOOK JACKET
Bibliography Includes bibliographical references and index
Subject Mobile commerce -- Security measures.
Business enterprises -- Computer networks -- Security measures.
Author Kou, Weidong.
Hu, Wen Chen, 1960-
Lee, Chung-Wei, 1965-
LC no. 2004016285
ISBN 1591403456 h/c
1591403464 s/c
1591403472 eisbn