Streff et al., 2009 - Google Patents
An Examination of Information Security in Mobile Banking ArchitecturesStreff et al., 2009
View PDF- Document ID
- 4504329409770038390
- Author
- Streff K
- Haar J
- Publication year
- Publication venue
- Journal of Information Systems Applied Research
External Links
Snippet
This paper is an examination of mobile banking architectures and the security issues that relate to those architectures and mobile banking systems. The paper reviews and defines mobile banking and looks at reasons why banks are going mobile. We then explore the …
- 238000005516 engineering process 0 description 20
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11140150B2 (en) | System and method for secure online authentication | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
Wright et al. | Cyber security and mobile threats: The need for antivirus applications for smart phones | |
Vishnuvardhan et al. | A study of digital banking: Security issues and challenges | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Khandelwal et al. | An insight into the security issues and their solutions for android phones | |
Biswal et al. | Cyber‐crime prevention methodology | |
Luvanda et al. | Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications | |
Tully et al. | Mobile security: a practitioner’s perspective | |
Speed et al. | Mobile Security: How to secure, privatize and recover your devices | |
CN106453398A (en) | Data encryption system and method | |
Caleb | Phishing and Smishing Attacks | |
AT&T | ||
Streff et al. | An Examination of Information Security in Mobile Banking Architectures | |
Pavlovski et al. | Unified framework for multifactor authentication | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
Messaggi Kaya | Trust and security risks in mobile banking | |
Tidke et al. | Detection and prevention of Android malware thru permission analysis | |
Khan | A proposed taxonomy of cybersecurity risk in mobile applications | |
Armin | Mobile threats and the underground marketplace | |
Williams et al. | Follow the Money Through Apple Pay | |
Rivers et al. | A Study on Cyber Attacks and Vulnerabilities in Mobile Payment Applications | |
Doherty et al. | The state of financial trojans 2013 | |
Duarte | A Survey of Android Attacks Detection Techniques | |
Potter | Increased Use of Two-Factor Authentication Force New Social Engineering Tactics |