<p>This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS,
Mobile payment systems: secure network architectures and protocols
β Scribed by TΓ©llez, JesΓΊs;Zeadally, Sherali
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Series
- Computer communications and networks
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Preface -- Contents -- 1 Introduction -- 1.1 Electronic Money -- 1.1.1 Advantages and Disadvantages of Electronic Money -- 1.1.2 Characteristics of Electronic Money -- 1.2 Electronic Commerce -- 1.3 Mobile Commerce -- 1.4 Mobile Payment -- 1.4.1 Mobile Payment Characteristics -- 1.4.2 Existing Mobile Payment Methods -- 1.4.2.1 Basis of Payment -- 1.4.2.2 Timing of Payment -- 1.4.2.3 Medium of Payment -- 1.4.2.4 Payment Amount -- 1.4.2.5 Location of Payment -- 1.4.3 Mobile Payment Stakeholders -- 1.4.4 Technologies for Mobile Payments;This important text/reference presents the latest research and developments in the field of mobile payment systems, covering issues of mobile device security, architectures and models for mobile payment systems, and transaction security in mobile payment systems. Topics and features: Introduces the fundamental concepts in mobile payment systems, discussing the benefits and disadvantages of such systems, and the entities that underpin them Reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices Examines the different models for mobile payments, presenting a classification based on their core features Presents a summary of the most commonly used cryptography schemes for secure communications Outlines the key challenges in mobile payment systems, covering security for ubiquitous mobile commerce and usability issues Highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of mobile payment systems This authoritative work will serve as a valuable reference for students, researchers, designers, developers, and engineers with a strong interest in mobile commerce, and in mobile payment systems in particular. Dr. JesΓΊs TΓ©llez is an Associate Professor in the Department of Computer Science at the University of Carabobo, Valencia, Venezuela. Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. His other publications include the Springer titles Privacy in a Digital, Networked World, Next-Generation Wireless Technologies, and Unique Radio Innovation for the 21st Century.
β¦ Table of Contents
Preface --
Contents --
1 Introduction --
1.1 Electronic Money --
1.1.1 Advantages and Disadvantages of Electronic Money --
1.1.2 Characteristics of Electronic Money --
1.2 Electronic Commerce --
1.3 Mobile Commerce --
1.4 Mobile Payment --
1.4.1 Mobile Payment Characteristics --
1.4.2 Existing Mobile Payment Methods --
1.4.2.1 Basis of Payment --
1.4.2.2 Timing of Payment --
1.4.2.3 Medium of Payment --
1.4.2.4 Payment Amount --
1.4.2.5 Location of Payment --
1.4.3 Mobile Payment Stakeholders --
1.4.4 Technologies for Mobile Payments 1.5 Mobile Payment System (MPS)1.5.1 Entities --
2 Mobile Device Security --
2.1 Mobile Devices --
2.1.1 Classification of Mobile Devices --
2.1.2 Mobile Operating Systems (Mobile OSs) --
2.2 Mobile Device Security --
2.2.1 Mobile Device Security Versus PersonalComputer Security --
2.2.2 Threat Model --
2.2.2.1 Targets for Mobile Device --
2.2.2.2 Adversaries --
2.2.2.3 Attack Vectors --
2.2.3 Mobile Malware --
2.2.4 Security Solutions for Mobile Devices --
2.2.4.1 Intrusion Detection Systems --
2.2.4.2 Trusted Mobile 3 Architectures and Models for Mobile Payment Systems3.1 Classifications of Mobile Payment Models: State of the Art --
3.1.1 Micro-payments --
3.1.2 Cryptographic Technique --
3.1.2.1 Asymmetric Cryptographic --
3.1.2.2 Symmetric Cryptographic --
3.1.3 Technology Used --
3.1.3.1 Short Message Service (SMS) --
3.1.3.2 Biometric Technology --
3.1.3.3 Radio-Frequency Identification (RFID) Technology --
3.1.3.4 Near Field Communication (NFC) --
3.1.3.5 2-D Barcode Technology --
3.1.3.6 Peer-to-Peer (P2P) Technology --
3.1.4 Session Initiation Protocol (SIP) 3.1.5 Communication Restriction3.1.6 Mobile Agent Technology --
3.1.7 Wireless Application Protocol (WAP) --
4 Security in Mobile Payment Systems --
4.1 Security Requirements --
4.2 Basic Concepts in Cryptography --
4.2.1 Secure Sockets Layer (SSL) --
4.2.2 Symmetric Cryptography --
4.2.2.1 Message Authentication Code (MAC) --
4.2.3 Public Key Cryptography --
4.2.3.1 Digital Signatures --
4.2.3.2 Certificate Authorities --
4.2.4 Elliptic Curve Cryptography --
4.2.5 Self-Certified Public Keys 4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions4.3 Security and Constraints of Mobile Payment Systems --
4.3.1 Constraint of Wireless Environments --
4.3.1.1 Resource Limitations of Mobile Devices --
4.3.2 Characteristics of Wireless Networks --
5 Future Challenges and Opportunities --
Bibliography
β¦ Subjects
Communications engineering--telecommunications;COMPUTERS--Computer Literacy;COMPUTERS--Computer Science;COMPUTERS--Data Processing;COMPUTERS--Hardware--General;COMPUTERS--Information Technology;COMPUTERS--Machine Theory;COMPUTERS--Reference;Electronic funds transfers;Mobile computing;Network hardware;Ubiquitous computing;Electronic books;Communications engineering -- telecommunications;COMPUTERS -- Computer Literacy;COMPUTERS -- Computer Science;COMPUTERS -- Data Processing;COMPUTERS -- Hardware
π SIMILAR VOLUMES
Preface -- Contents -- 1 Introduction -- 1.1 Electronic Money -- 1.1.1 Advantages and Disadvantages of Electronic Money -- 1.1.2 Characteristics of Electronic Money -- 1.2 Electronic Commerce -- 1.3 Mobile Commerce -- 1.4 Mobile Payment -- 1.4.1 Mobile Payment Characteristics -- 1.4.2 Existing Mobil
The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark? Featuring the contributions of prominent researcher
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.