-
1
-
-
2942705949
-
Security model for intra-domain mobility management protocol
-
Aljifri, H. and Tyrewalla, N. (2005) 'Security model for intra-domain mobility management protocol', International Journal of Mobile Communications, Vol. 2, No. 2, pp. 157-170.
-
(2005)
International Journal of Mobile Communications
, vol.2
, Issue.2
, pp. 157-170
-
-
Aljifri, H.1
Tyrewalla, N.2
-
2
-
-
33645981889
-
-
Advanced Encryption Standard, November
-
Advanced Encryption Standard (2001) FIPS PUB 197, November.
-
(2001)
FIPS PUB
, vol.197
-
-
-
3
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang, K.F. and Chang, C.C. (2003) 'A self-encryption mechanism for authentication of roaming and teleconference services', IEEE Transactions on Wireless Communications, Vol. 2, No. 2, pp.400-407.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
5
-
-
2942532247
-
Exploring e-business implications of the mobile Internet: A cross-national survey in Hong Kong, Japan and Korea
-
Kim, J., Lee, I., Lee, Y., Choi, B., Hong, S.J., Tam, K.Y., Naruse, K. and Maeda, Y. (2004) 'Exploring e-business implications of the mobile Internet: a cross-national survey in Hong Kong, Japan and Korea', International Journal of Mobile Communications, Vol. 2, No. 1, pp. 1-21.
-
(2004)
International Journal of Mobile Communications
, vol.2
, Issue.1
, pp. 1-21
-
-
Kim, J.1
Lee, I.2
Lee, Y.3
Choi, B.4
Hong, S.J.5
Tam, K.Y.6
Naruse, K.7
Maeda, Y.8
-
6
-
-
2942565717
-
Mobile commerce and electronic commerce in Thailand: A value space analysis
-
Kini, R.B. and Thanarithiporn, S. (2004) 'Mobile commerce and electronic commerce in Thailand: a value space analysis', International Journal of Mobile Communications, Vol. 2, No. 1, pp.22-37.
-
(2004)
International Journal of Mobile Communications
, vol.2
, Issue.1
, pp. 22-37
-
-
Kini, R.B.1
Thanarithiporn, S.2
-
7
-
-
7244236291
-
Localised authentication for inter-network roaming across wireless LANs
-
Long, M., Wu, C.H. and Irwin, J.D. (2004) 'Localised authentication for inter-network roaming across wireless LANs', IEE Proceedings of Communications, Vol. 151, No. 5, pp.496-500.
-
(2004)
IEE Proceedings of Communications
, vol.151
, Issue.5
, pp. 496-500
-
-
Long, M.1
Wu, C.H.2
Irwin, J.D.3
-
8
-
-
20144364964
-
Consumer perception and attitude toward mobile communication
-
Massoud, S. and Gupta, O.K. (2003) 'Consumer perception and attitude toward mobile communication', International Journal of Mobile Communications, Vol. 1, No. 4, pp.390-408.
-
(2003)
International Journal of Mobile Communications
, vol.1
, Issue.4
, pp. 390-408
-
-
Massoud, S.1
Gupta, O.K.2
-
9
-
-
20144386157
-
Building a wireless network infrastructure under budget constraints
-
Mcmahan, R.A., Devries, P.D. and Chong, P.P. (2005) 'Building a wireless network infrastructure under budget constraints', International Journal of Mobile Communications, Vol. 3, No. 4, pp.445-456.
-
(2005)
International Journal of Mobile Communications
, vol.3
, Issue.4
, pp. 445-456
-
-
Mcmahan, R.A.1
Devries, P.D.2
Chong, P.P.3
-
10
-
-
84944878354
-
-
Boca Raton, FL: CRC Press
-
Menezes, A., Van Oorschot, P. and Vanstone, S. (1996) Handbook of Applied Cryptography, Boca Raton, FL: CRC Press.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
11
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
San Antonio
-
Mitchell, J.C., Shmatikov, V. and Stern, U. (1998) 'Finite-state analysis of SSL 3.0', Proceedings of the 7th USENIX Security Symposium, San Antonio, pp.201-216.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 201-216
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
12
-
-
2942729717
-
Can mobile services facilitate commerce? Findings from the Greek telecommunications market
-
Mylonakis, J. (2004) 'Can mobile services facilitate commerce? Findings from the Greek telecommunications market', International Journal of Mobile Communications, Vol. 2, No. 2, pp. 188-198.
-
(2004)
International Journal of Mobile Communications
, vol.2
, Issue.2
, pp. 188-198
-
-
Mylonakis, J.1
-
13
-
-
7544234396
-
-
C.B. Schneier (Ed.), 2nd ed., USA: John Wiley and Sons Inc.
-
Sutherland, P. (1996) Applied Cryptography, Protocols, Algorithms, and Source Code, in C.B. Schneier (Ed.), 2nd ed., USA: John Wiley and Sons Inc.
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code
-
-
Sutherland, P.1
-
14
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
Suzuki, S. and Nakada, K. (1997) 'An authentication technique based on distributed security management for the global mobility network', IEEE Journal on Selected Areas in Communications, Vol. 15, No. 8, pp.1608-1617.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
15
-
-
14544271231
-
M-commerce security: The impact of Wireless Application Protocol (WAP) security services on e-business and e-health solutions
-
Tan, J., Wen, H.J. and Gyires, T. (2003) 'M-commerce security: the impact of Wireless Application Protocol (WAP) security services on e-business and e-health solutions', International Journal of Mobile Communications, Vol. 1, No. 4, pp.409-424.
-
(2003)
International Journal of Mobile Communications
, vol.1
, Issue.4
, pp. 409-424
-
-
Tan, J.1
Wen, H.J.2
Gyires, T.3
-
16
-
-
14544288238
-
A mobile agent protected scheme using pairing-based cryptosystems
-
Tsaur, W.J. and Ho, C.H. (2005) 'A mobile agent protected scheme using pairing-based cryptosystems', International Journal of Mobile Communications, Vol. 3, No. 2, pp.183-196.
-
(2005)
International Journal of Mobile Communications
, vol.3
, Issue.2
, pp. 183-196
-
-
Tsaur, W.J.1
Ho, C.H.2
-
17
-
-
20144363239
-
Wireless sales force automation concepts and cases
-
Walker, B. and Barnes, S.J. (2005) 'Wireless sales force automation concepts and cases', International Journal of Mobile Communications, Vol. 3, No. 4, pp.411-427.
-
(2005)
International Journal of Mobile Communications
, vol.3
, Issue.4
, pp. 411-427
-
-
Walker, B.1
Barnes, S.J.2
|