By Topic

Security analysis on mobile e-commerce

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wang Shunman ; Dept. of Electron. Eng., Beijing Inst. of Technol., China ; Tao Ran ; WangYue

When it comes to the information society, Internet is one of the biggest push issue to the transform. Key aspects were the increased availability of computer networks and the trend towards teamwork. So comes out the CSCW technique. EC is one of the typical uses of CSCW, so the paper introduces the basic conception of CSCW and EC, and then gives the secure analysis to EC, emphasis on the techniques of it. Then the paper gives a detailed analysis on mobile EC, it's the tendency of EC, gives out the PKI and other techniques used in mobile EC to solve the secure problems.

Published in:

Computer Supported Cooperative Work in Design, 2004. Proceedings. The 8th International Conference on  (Volume:1 )

Date of Conference:

26-28 May 2004