2018
DOI: 10.1007/978-3-319-93554-6_95
|View full text |Cite
|
Sign up to set email alerts
|

Analysis on Mobile Payment Security and Its Defense Strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
1
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
1
1
0
1
Order By: Relevance
“…A previous study conducted by Yin et al [12] supports the argument of this study that the method of m-payment is secure when using the public key encryption cryptosystem. This qualitative study finds that using m-payment applications is more secure than swiping credit or debit cards in public.…”
Section: Resultssupporting
confidence: 84%
See 1 more Smart Citation
“…A previous study conducted by Yin et al [12] supports the argument of this study that the method of m-payment is secure when using the public key encryption cryptosystem. This qualitative study finds that using m-payment applications is more secure than swiping credit or debit cards in public.…”
Section: Resultssupporting
confidence: 84%
“…This has involved developing a defense strategy that monitors running apps and alerts users when malicious apps leak payment information. The strategy's feasibility has been demonstrated by using an Alipay dataset [12]. A thorough assessment of the many aspects of the m-payment system, including vulnerability analysis, infrastructure, architecture, and threats from potential and probable worms and viruses, was presented by Hassan et al [13].…”
Section: Introductionmentioning
confidence: 99%
“…En los últimos años, la tecnología de internet móvil ha penetrado todos los mercados de las industrias, lo cual ha ocasionado que la seguridad de las aplicaciones se está volviendo cada vez más importante [2], por lo tanto, los desarrolladores deben encontrar nuevas formas de revisar y probar los contenidos, de manera que se puedan depurar las aplicaciones antes de salir al mercado, con el fin de evitar errores [3]. Es de anotar que no solo la seguridad es importante, también existen otros atributos que deben ser evaluados, como por ejemplo el desempeño.…”
Section: Introductionunclassified