Muutke küpsiste eelistusi

E-raamat: Mobile Payment Systems: Secure Network Architectures and Protocols

  • Formaat - EPUB+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, and the entities that underpin them; reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices; examines the different models for mobile payments, presenting a classification based on their core features; presents a summary of the most commonly used cryptography schemes for secure communications; outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues; highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of MPS.

Arvustused

There is a thorough bibliography, which is not surprising for a work that is in essence a review of the current literature. The book is well laid out, illustrated with useful figures and tables, and has a good index. Overall, this is a concise and interesting explanation of the complex series of processes that are required to translate a simple tap-and-go payment into a secure mobile financial transaction. (David B. Henderson, Computing Reviews, February, 2019)

1 Introduction
1(18)
1.1 Electronic Money
1(3)
1.1.1 Advantages and Disadvantages of Electronic Money
3(1)
1.1.2 Characteristics of Electronic Money
3(1)
1.2 Electronic Commerce
4(2)
1.3 Mobile Commerce
6(1)
1.4 Mobile Payment
7(8)
1.4.1 Mobile Payment Characteristics
8(1)
1.4.2 Existing Mobile Payment Methods
9(3)
1.4.3 Mobile Payment Stakeholders
12(1)
1.4.4 Technologies for Mobile Payments
13(2)
1.5 Mobile Payment System (MPS)
15(4)
1.5.1 Entities
16(3)
2 Mobile Device Security
19(16)
2.1 Mobile Devices
19(4)
2.1.1 Classification of Mobile Devices
19(2)
2.1.2 Mobile Operating Systems (Mobile OSs)
21(2)
2.2 Mobile Device Security
23(12)
2.2.1 Mobile Device Security Versus Personal Computer Security
25(1)
2.2.2 Threat Model
26(3)
2.2.3 Mobile Malware
29(2)
2.2.4 Security Solutions for Mobile Devices
31(4)
3 Architectures and Models for Mobile Payment Systems
35(58)
3.1 Classifications of Mobile Payment Models: State of the Art
35(58)
3.1.1 Micro-payments
35(7)
3.1.2 Cryptographic Technique
42(9)
3.1.3 Technology Used
51(24)
3.1.4 Session Initiation Protocol (SIP)
75(4)
3.1.5 Communication Restriction
79(7)
3.1.6 Mobile Agent Technology
86(4)
3.1.7 Wireless Application Protocol (WAP)
90(3)
4 Security in Mobile Payment Systems
93(14)
4.1 Security Requirements
93(2)
4.2 Basic Concepts in Cryptography
95(8)
4.2.1 Secure Sockets Layer (SSL)
95(1)
4.2.2 Symmetric Cryptography
95(3)
4.2.3 Public Key Cryptography
98(3)
4.2.4 Elliptic Curve Cryptography
101(1)
4.2.5 Self-Certified Public Keys
102(1)
4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions
102(1)
4.3 Security and Constraints of Mobile Payment Systems
103(4)
4.3.1 Constraint of Wireless Environments
103(3)
4.3.2 Characteristics of Wireless Networks
106(1)
5 Future Challenges and Opportunities
107(11)
Bibliography 118(11)
Index 129
Dr. Jesús Téllez is an Associate Professor in the Department of Computer Science at the University of Carabobo, Valencia, Venezuela. Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. His other publications include the Springer titles Privacy in a Digital, Networked World, Next-Generation Wireless Technologies, and Unique Radio Innovation for the 21st Century.