Login / Signup

Developing Provable Secure M-Commerce Applications.

Holger GrandyDominik HanebergWolfgang ReifKurt Stenzel
Published in: ETRICS (2006)
Keyphrases
  • security issues
  • database
  • case study
  • worst case
  • mobile phone
  • greedy algorithm
  • business models
  • mobile commerce
  • identity management
  • mobile payment