Téllez / Zeadally | Mobile Payment Systems | E-Book | www.sack.de
E-Book

E-Book, Englisch, 142 Seiten

Reihe: Computer Communications and Networks

Téllez / Zeadally Mobile Payment Systems

Secure Network Architectures and Protocols
1. Auflage 2017
ISBN: 978-3-319-23033-7
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark

Secure Network Architectures and Protocols

E-Book, Englisch, 142 Seiten

Reihe: Computer Communications and Networks

ISBN: 978-3-319-23033-7
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark



This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, and the entities that underpin them; reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices; examines the different models for mobile payments, presenting a classification based on their core features; presents a summary of the most commonly used cryptography schemes for secure communications; outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues; highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of MPS.

Dr. Jesús Téllez is an Associate Professor in the Department of Computer Science at the University of Carabobo, Valencia, Venezuela.
Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. His other publications include the Springer titles Privacy in a Digital, Networked World, Next-Generation Wireless Technologies, and Unique Radio Innovation for the 21st Century.

Téllez / Zeadally Mobile Payment Systems jetzt bestellen!

Weitere Infos & Material


1;Preface;8
2;Contents;11
3;1 Introduction;13
3.1;1.1 Electronic Money;13
3.1.1;1.1.1 Advantages and Disadvantages of Electronic Money;15
3.1.2;1.1.2 Characteristics of Electronic Money;15
3.2;1.2 Electronic Commerce;16
3.3;1.3 Mobile Commerce;18
3.4;1.4 Mobile Payment;19
3.4.1;1.4.1 Mobile Payment Characteristics;20
3.4.2;1.4.2 Existing Mobile Payment Methods;21
3.4.2.1;1.4.2.1 Basis of Payment;21
3.4.2.2;1.4.2.2 Timing of Payment;23
3.4.2.3;1.4.2.3 Medium of Payment;23
3.4.2.4;1.4.2.4 Payment Amount;24
3.4.2.5;1.4.2.5 Location of Payment;24
3.4.3;1.4.3 Mobile Payment Stakeholders;24
3.4.4;1.4.4 Technologies for Mobile Payments;25
3.5;1.5 Mobile Payment System (MPS);27
3.5.1;1.5.1 Entities;28
4;2 Mobile Device Security;31
4.1;2.1 Mobile Devices;31
4.1.1;2.1.1 Classification of Mobile Devices;31
4.1.2;2.1.2 Mobile Operating Systems (Mobile OSs);33
4.2;2.2 Mobile Device Security;35
4.2.1;2.2.1 Mobile Device Security Versus PersonalComputer Security;37
4.2.2;2.2.2 Threat Model;38
4.2.2.1;2.2.2.1 Targets for Mobile Device;39
4.2.2.2;2.2.2.2 Adversaries;40
4.2.2.3;2.2.2.3 Attack Vectors;40
4.2.3;2.2.3 Mobile Malware;41
4.2.4;2.2.4 Security Solutions for Mobile Devices;43
4.2.4.1;2.2.4.1 Intrusion Detection Systems;43
4.2.4.2;2.2.4.2 Trusted Mobile;44
5;3 Architectures and Models for Mobile Payment Systems;46
5.1;3.1 Classifications of Mobile Payment Models: State of the Art;46
5.1.1;3.1.1 Micro-payments;46
5.1.2;3.1.2 Cryptographic Technique;53
5.1.2.1;3.1.2.1 Asymmetric Cryptographic;53
5.1.2.2;3.1.2.2 Symmetric Cryptographic;57
5.1.3;3.1.3 Technology Used;62
5.1.3.1;3.1.3.1 Short Message Service (SMS);62
5.1.3.2;3.1.3.2 Biometric Technology;67
5.1.3.3;3.1.3.3 Radio-Frequency Identification (RFID) Technology;68
5.1.3.4;3.1.3.4 Near Field Communication (NFC);73
5.1.3.5;3.1.3.5 2-D Barcode Technology;77
5.1.3.6;3.1.3.6 Peer-to-Peer (P2P) Technology;81
5.1.4;3.1.4 Session Initiation Protocol (SIP);86
5.1.5;3.1.5 Communication Restriction;90
5.1.6;3.1.6 Mobile Agent Technology;97
5.1.7;3.1.7 Wireless Application Protocol (WAP);101
6;4 Security in Mobile Payment Systems;103
6.1;4.1 Security Requirements;103
6.2;4.2 Basic Concepts in Cryptography;105
6.2.1;4.2.1 Secure Sockets Layer (SSL);105
6.2.2;4.2.2 Symmetric Cryptography;105
6.2.2.1;4.2.2.1 Message Authentication Code (MAC);107
6.2.3;4.2.3 Public Key Cryptography;108
6.2.3.1;4.2.3.1 Digital Signatures;109
6.2.3.2;4.2.3.2 Certificate Authorities;110
6.2.4;4.2.4 Elliptic Curve Cryptography;111
6.2.5;4.2.5 Self-Certified Public Keys;112
6.2.6;4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions;112
6.3;4.3 Security and Constraints of Mobile Payment Systems;113
6.3.1;4.3.1 Constraint of Wireless Environments;113
6.3.1.1;4.3.1.1 Resource Limitations of Mobile Devices;113
6.3.2;4.3.2 Characteristics of Wireless Networks;116
7;5 Future Challenges and Opportunities;117
8;Bibliography;128
9;Index;138



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.