-
1
-
-
0037592637
-
"Networks security measures using neuro-fuzzy agents"
-
Abouzakhar, N. and Manson, G. (2003), "Networks security measures using neuro-fuzzy agents", Information Management & Computer Security, Vol. 11 No. 1, pp. 33-8.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.1
, pp. 33-38
-
-
Abouzakhar, N.1
Manson, G.2
-
2
-
-
9244227531
-
"Demystifying wireless technologies: Navigating through the wireless technology maze"
-
Agrawal, M. (2003), "Demystifying wireless technologies: navigating through the wireless technology maze", Communications of the Association for Information Systems, Vol. 12, pp. 166-82.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, pp. 166-182
-
-
Agrawal, M.1
-
3
-
-
0036693113
-
"Introduction to mobile Internet technical architecture"
-
Asunmaa, P., Inkinen, S., Nykanen, P., Paivarinta, S., Sormunen, T. and Souknuuti, M. (2002), "Introduction to mobile Internet technical architecture", Wireless Personal Communications, pp. 253-9.
-
(2002)
Wireless Personal Communications
, pp. 253-259
-
-
Asunmaa, P.1
Inkinen, S.2
Nykanen, P.3
Paivarinta, S.4
Sormunen, T.5
Souknuuti, M.6
-
4
-
-
0035780674
-
"Mobile computer systems: Security considerations"
-
Badamas, M.A. (2001), "Mobile computer systems: security considerations", Information Management & Computer Security, Vol. 9 No. 3, pp. 134-6.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.3
, pp. 134-136
-
-
Badamas, M.A.1
-
5
-
-
0002638023
-
"Securing network software applications"
-
Bashir, I., Serafini, E. and Wall, K. (2001), "Securing network software applications", Communications of ACM, Vol. 44 No. 2, pp. 29-30.
-
(2001)
Communications of ACM
, vol.44
, Issue.2
, pp. 29-30
-
-
Bashir, I.1
Serafini, E.2
Wall, K.3
-
6
-
-
23944459002
-
"Classification of malicious host threats in mobile agent computing"
-
Biermann, E. and Cloete, E. (2002), "Classification of malicious host threats in mobile agent computing", SAICSIT, pp. 141-8.
-
(2002)
SAICSIT
, pp. 141-148
-
-
Biermann, E.1
Cloete, E.2
-
7
-
-
9244248561
-
"High wireless act: The risks of mobile communication"
-
Biery, K. and Hager, D. (2001), "High wireless act: the risks of mobile communication", Security Management, pp. 87-92.
-
(2001)
Security Management
, pp. 87-92
-
-
Biery, K.1
Hager, D.2
-
9
-
-
0036693861
-
"Wireless IP and its challenges for the heterogeneous environment"
-
Dixit, S. (2002), Wireless IP and its challenges for the heterogeneous environment", Wireless Personal Communications, Vol. 22, pp. 261-73.
-
(2002)
Wireless Personal Communications
, vol.22
, pp. 261-273
-
-
Dixit, S.1
-
12
-
-
0036694354
-
"Technology challenges in the development of Wireless Personal Area Networks"
-
Engels, M. (2002), "Technology challenges in the development of Wireless Personal Area Networks", Wireless Personal Communications Vol. 22, pp. 319-29.
-
(2002)
Wireless Personal Communications
, vol.22
, pp. 319-329
-
-
Engels, M.1
-
13
-
-
0036980250
-
"Secure wireless gateway"
-
Godber, A. and Dasgupta, P. (2002), "Secure wireless gateway", International Journal of Network Management, Vol. 12 No. 67, pp. 41-6.
-
(2002)
International Journal of Network Management
, vol.12
, Issue.67
, pp. 41-46
-
-
Godber, A.1
Dasgupta, P.2
-
14
-
-
4844219688
-
"Mobile risk management: E-finance in the wireless environment"
-
Discussion Paper, The World Bank Financial Sector, The World Bank, Washington, DC
-
Kellermann, T. (2002), "Mobile risk management: e-finance in the wireless environment", Discussion Paper, The World Bank Financial Sector, The World Bank, Washington, DC.
-
(2002)
-
-
Kellermann, T.1
-
15
-
-
0036040733
-
"A framework for analyzing e-commerce security"
-
Kesh, S., Ramanujan, S. and Nerur, S. (2002), "A framework for analyzing e-commerce security", Information Management & Computer Security, Vol. 10 No. 4, pp. 149-58.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 149-158
-
-
Kesh, S.1
Ramanujan, S.2
Nerur, S.3
-
16
-
-
85084160839
-
"Security analysis of the Palm Operating System and its weaknesses against malicious code threats"
-
Washington, DC
-
Kingpin and Mudge (2001), "Security analysis of the Palm Operating System and its weaknesses against malicious code threats", Proceedings of the 10th USENIX Security Symposium, Washington, DC, pp. 135-51.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 135-151
-
-
Kingpin, A.1
Mudge, A.2
-
17
-
-
0036605067
-
"Supporting mobile commerce applications using dependable wireless networks"
-
Malloy, A.D., Varshney, U. and Snow, A.P. (2002), "Supporting mobile commerce applications using dependable wireless networks", Mobile Networks and Applications, Vol. 7, pp. 225-34.
-
(2002)
Mobile Networks and Applications
, vol.7
, pp. 225-234
-
-
Malloy, A.D.1
Varshney, U.2
Snow, A.P.3
-
18
-
-
9244259601
-
"Where in the world on the Web does location matter? A framework for location-based services in m-commerce"
-
Boston, MA
-
Mennecke, B. and Strader, T. (2001), "Where in the world on the Web does location matter? A framework for location-based services in m-commerce", 7th Americas Conference on Information Systems, Boston, MA, pp. 450-5.
-
(2001)
7th Americas Conference on Information Systems
, pp. 450-455
-
-
Mennecke, B.1
Strader, T.2
-
19
-
-
9244258520
-
-
White paper, SANS Institute, Bethesda, MD
-
Ow, E. (2001), "IEEE 802.11b wireless LAN: security risks", White paper, SANS Institute, Bethesda, MD, pp. 1-8.
-
(2001)
"IEEE 802.11b Wireless LAN: Security Risks"
, pp. 1-8
-
-
Ow, E.1
-
20
-
-
9244243579
-
"The risk of mobile security nonchalance"
-
Paredes, D. (2002), "The risk of mobile security nonchalance", misweb.com, p 1.
-
(2002)
Misweb.com
, pp. 1
-
-
Paredes, D.1
-
21
-
-
0036694365
-
"Security in wireless communication"
-
Rahman, M.G. and Imai, H. (2002), "Security in wireless communication", Wireless Personal Communications, Vol. 22, pp. 213-28.
-
(2002)
Wireless Personal Communications
, vol.22
, pp. 213-228
-
-
Rahman, M.G.1
Imai, H.2
-
22
-
-
9244260121
-
"Securing the mobile economy"
-
White paper, Baltimore Technologies, Beckenham
-
Singh, G. (2002), "Securing the mobile economy", White paper, Baltimore Technologies, Beckenham, pp. 1-8.
-
(2002)
, pp. 1-8
-
-
Singh, G.1
-
23
-
-
9244253671
-
"Which wireless infrastructure?"
-
Singh, G. (2003), "Which wireless infrastructure?", Communications News, Vol. 40 No. 3, p. 16.
-
(2003)
Communications News
, vol.40
, Issue.3
, pp. 16
-
-
Singh, G.1
-
24
-
-
0042363358
-
"Security architectures for network clients"
-
Skoularidous, V. and Spinellis, D. (2003), "Security architectures for network clients", Information Management & Computer Security, Vol. 11 No. 2, pp. 84-91.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 84-91
-
-
Skoularidous, V.1
Spinellis, D.2
-
25
-
-
2942610126
-
"Wireless/mobile e-commerce: Technologies, applications, and issues"
-
Boston, MA
-
Tarasewich, P., Nickerson, R. and Warkentin, M. (2001), "Wireless/mobile e-commerce: technologies, applications, and issues", 7th Americas Conference on Information Systems, Boston, MA, pp. 435-8.
-
(2001)
7th Americas Conference on Information Systems
, pp. 435-438
-
-
Tarasewich, P.1
Nickerson, R.2
Warkentin, M.3
-
26
-
-
0038197411
-
"Issues in mobile e-commerce"
-
Tarasewich, P., Nickerson, R. and Warkentin, M. (2002), "Issues in mobile e-commerce", Communications of the Association for Information Systems, Vol. 8, pp. 41-64.
-
(2002)
Communications of the Association for Information Systems
, vol.8
, pp. 41-64
-
-
Tarasewich, P.1
Nickerson, R.2
Warkentin, M.3
-
27
-
-
2442601796
-
"Wireless I: Mobile and wireless information systems: Applications, networks, and research problems"
-
Varshney, U. (2003), "Wireless I: mobile and wireless information systems: applications, networks, and research problems", Communications of the Association for Information Systems, Vol. 12, pp. 155-66.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, pp. 155-166
-
-
Varshney, U.1
-
28
-
-
0002432970
-
"Emerging mobile and wireless networks"
-
Varshney, R. and Vetter, J. (2000), "Emerging mobile and wireless networks", Communications of the ACM, Vol. 43 No. 6, pp. 73-81.
-
(2000)
Communications of the ACM
, vol.43
, Issue.6
, pp. 73-81
-
-
Varshney, R.1
Vetter, J.2
-
29
-
-
0036605085
-
"Mobile commerce: Framework, applications and networking support"
-
Varshney, U. and Vetter, R. (2002), "Mobile commerce: framework, applications and networking support", Mobile Networks and Applications, Vol. 7, pp. 185-98.
-
(2002)
Mobile Networks and Applications
, vol.7
, pp. 185-198
-
-
Varshney, U.1
Vetter, R.2
-
30
-
-
9244239142
-
"Extending Web sites to wireless devices: A WAP framework with an example in education portals"
-
Boston, MA
-
Verma, S. (2001), "Extending Web sites to wireless devices: a WAP framework with an example in education portals", 7th Americas Conference on Information Systems, Boston, MA, pp. 468-70.
-
(2001)
7th Americas Conference on Information Systems
, pp. 468-470
-
-
Verma, S.1
-
32
-
-
9244224595
-
"Delivery of personalized and adaptive content to mobile devices: A framework and enabling technology"
-
Zhang, D. (2003), "Delivery of personalized and adaptive content to mobile devices: a framework and enabling technology", Communications of the Association for Information Systems, Vol. 12, pp. 183-202.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, pp. 183-202
-
-
Zhang, D.1
-
33
-
-
9244260122
-
"M-commerce versus Internet-based e-commerce: The key differences"
-
Dallas, TX
-
Zhang, J. and Yufei, Y. (2002), "M-commerce versus Internet-based e-commerce: the key differences", Eighth Americas Conference on Information Systems, Dallas, TX, pp. 1892-901.
-
(2002)
Eighth Americas Conference on Information Systems
, pp. 1892-1901
-
-
Zhang, J.1
Yufei, Y.2
|