[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Streff et al., 2009 - Google Patents

An Examination of Information Security in Mobile Banking Architectures

Streff et al., 2009

View PDF
Document ID
4504329409770038390
Author
Streff K
Haar J
Publication year
Publication venue
Journal of Information Systems Applied Research

External Links

Snippet

This paper is an examination of mobile banking architectures and the security issues that relate to those architectures and mobile banking systems. The paper reviews and defines mobile banking and looks at reasons why banks are going mobile. We then explore the …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11140150B2 (en) System and method for secure online authentication
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Wright et al. Cyber security and mobile threats: The need for antivirus applications for smart phones
Vishnuvardhan et al. A study of digital banking: Security issues and challenges
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Khandelwal et al. An insight into the security issues and their solutions for android phones
Biswal et al. Cyber‐crime prevention methodology
Luvanda et al. Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications
Tully et al. Mobile security: a practitioner’s perspective
Speed et al. Mobile Security: How to secure, privatize and recover your devices
CN106453398A (en) Data encryption system and method
Caleb Phishing and Smishing Attacks
AT&T
Streff et al. An Examination of Information Security in Mobile Banking Architectures
Pavlovski et al. Unified framework for multifactor authentication
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
Messaggi Kaya Trust and security risks in mobile banking
Tidke et al. Detection and prevention of Android malware thru permission analysis
Khan A proposed taxonomy of cybersecurity risk in mobile applications
Armin Mobile threats and the underground marketplace
Williams et al. Follow the Money Through Apple Pay
Rivers et al. A Study on Cyber Attacks and Vulnerabilities in Mobile Payment Applications
Doherty et al. The state of financial trojans 2013
Duarte A Survey of Android Attacks Detection Techniques
Potter Increased Use of Two-Factor Authentication Force New Social Engineering Tactics