لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
علی فانیان، مهدی برنجکوب، امینه صالحی نجف آبادی، "ارائه راهکاری ...
http ://www .tafahormnews _ com/S ections-req- viewarticنle- artid-73 -Page- 1 ...
http : /en.wikipedia. org/wiki/In formation securit March 2010 9 , ...
PK- Aءه Chaowen, Xie Hui, Qin Xi, Qin Zheng, SIM ...
http : //www _ vi sta _ ir/? view=c ontextcid=29 ...
http ://www .farsnews _ com/new stext.php?nn=8 80 7131193, 7 March ...
http : //www .hiberd.com/es S _ -hiberd_web- 1[2.htm, 7 March ...
Speedfacts Online Research ...
Interfaces, vol.27, 2005, pp.181-183. ...
smart cards, Computer Standards & Interfaces, vol.26 , 2004, pp.167-169. ...
H.Y. Chien, J.K. Jan, Y.M. Tseng, An efficient and practical ...
Ren-Junn Hwang, Feng-Fu Su, A new efficient authentication protocol for ...
Interfaces, Vol.28, Issue.2, December 2005, _ 241-252. ...
http : //en _ wikipedia. O rg/w iki/ G eneral_Packet ...
Kelvin Chilomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchi son, ...
http : //en _ wikipedia. org/wiki/C ode_divi sion_mul _ 2 ...
Jim Kurose, Keith Ross Addi son-Wesley, "Computer Networking:A Top Down ...
http ://en.wikipedia. org/wiki/M obile banking, 7 March 2010. ...
_ ournal .com/articles 1 447 2_mob ile_bankin _ _ _ ...
Erik Larkin "Banking by phone: Convenient _ safe?", pcworld, Novermber ...
http ://www _ mmagl obal _ com/mbankin govervi _ , ...
Dalton Li, David Lin, Grace Zhao, and ...
Brian Huang , "Design and Correctness Proof of a security ...
Kelvin Chikomo, Ming Ki Chong, Alapan Arnab, Andrew Hutchison "Security ...
Stewart James Michael, CISSP, Neil Edde, ...
Saleem Kadhiwal , Muharmmad Anwar Usman Shaheed Zulfiquar , Ali ...
"Analysis of mobile payment security measures ع& and different standards" ...
http ://www .mfoundry. com/whitep aper/mFoundr _ _ EigaL.pd, 21 March ...
http : //www .westpac _ com. au/s ecurity/how- to -protect-yours ...
M. Hassinen, K. Hypponen, Strong mobile authentic ation, 2nd International ...
Symposium on Wireless Communic ation Systems, Sept. 5-7 2005, pp. ...
A. Wangensteen, _ Lunde, I. JGrstad, T. van Do, A ...
Technologies (ICTTA'06), Vol.1, April 2006, pp.88-93. ...
B. Sathish Babu, P. Venkatararm "Cognitive agents based authentication & ...
Johnny Li-Chang Lo, Judith Bishop, J.H.P. Eloff , :SMSSec: An ...
Billy Brumley, 2004, Helsinki universityof COMP128" pecial & A3/A8؛ه technology, ...
5 14/slides/S5 .brumley.comp 1 28.pdf [29] http ://www. wisegeek. com/what-is ...
Cardline, Ammerican Banker : GSM Best for Mobile Banking", Business ...
Mohsen Toorani, Ali Asghar Beheshti ...
C ommunic ations (ISCCO8), July 2008, pp. _ 705. ...
He Rongyu , Zhao Guolei, Chang ...
M. Badra, P. Urien, Toward SSL ...
integration in SIM SmartCards, IEEE Wireles C ommunic ations and ...
W. Itani, and A.I. Kayssi, "J2ME end-to end security for ...
M. Hassinen, :SafeSMS - End-to-end encryption for S9 messages, " ...
_ ecommunic ations (ConTELO5), Vol.2, June _ , pp.359-365. ...
symposium on wireless c ommunication systems, sept. 2005, pp.96-100. ...
نمایش کامل مراجع