Author:
Kayayurt Baris,Tuglular Tugkan
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference17 articles.
1. Agarwal, A.K., Gill, J.S., Wang, W.: An experimental study on wireless security protocols over mobile IP networks. In: IEEE Proceedings of 60th Vehicular Technology Conference (2004)
2. BouncyCastle: Bouncy Castle Documentation. (2006) http://www.bouncycastle.org/documentation.html
3. Dierks, T., Allen, C. The TLS protocol version 1.0, IETF RFC 2246 (1999)
4. Reynaud-Plantey, D. J2ME low level security: implementation versus specification. (2005) http://prdownloads.source forge.net/tinapoc/Reynaud_J2ME.pdf?download
5. Intel IEEE 802.11b high rate wireless local area networks, Intel Corporation (2000)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LD Based Framework to Mitigate Threats in Mobile Based Payment System;Research Anthology on Securing Mobile Technologies and Applications;2021
2. LD Based Framework to Mitigate Threats in Mobile Based Payment System;International Journal of Innovation in the Digital Economy;2019-10
3. Assessment of Digital Implementation in India and Challenges;International Journal of Digital Literacy and Digital Competence;2019-04
4. Secure Communication Protocol Between Two Mobile Devices Over Short Distances;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018
5. M-commerce Security Solution Based on the 3rd Generation Mobile Communication;2008 International Symposium on Computer Science and Computational Technology;2008