UCSY's Research Repository

Infrastructure-Based Protection of Unauthorized Access on M-Commerce

Show simple item record

dc.contributor.author Myint, Theint Zarni
dc.contributor.author Win, Su Su
dc.date.accessioned 2019-07-24T15:49:56Z
dc.date.available 2019-07-24T15:49:56Z
dc.date.issued 2010-12-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/1249
dc.description.abstract Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile devices such as Laptops, PDAs mobile phones and other handheld devices which can support the wireless communication. Consequently, these devices will play an increasing role in M-Commerce (Mobile Commerce) technology. M-Commerce offers the possibility of an entire new level of financial flexibility, taking advantages of both social and technological developments. As M-Commerce platforms mature, grow in popularity and store valuable information, hackers are also stepping their evil efforts on these field. This paper focuses on security aspects to protect against threat of M-Commerce and since M-Commerce is based on infrastructure mode and all the important data are passed through on air medium, it has lots of vulnerabilities which can be a chance for an unauthorized user to attack the valuable data of M-Commerce. Therefore, this paper specifies how to care for the above aspects by using WPA (Wi-Fi Protected Access) protocol. en_US
dc.language.iso en en_US
dc.publisher Fifth Local Conference on Parallel and Soft Computing en_US
dc.subject WPA en_US
dc.subject wireless en_US
dc.subject threat en_US
dc.subject vulnerabilities en_US
dc.subject Mobile Commerce en_US
dc.title Infrastructure-Based Protection of Unauthorized Access on M-Commerce en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics