Security analysis of third-party in-app payment in mobile applications (English)
- New search for: Yang, Wenbo
- New search for: Li, Juanru
- New search for: Zhang, Yuanyuan
- New search for: Gu, Dawu
- New search for: Yang, Wenbo
- New search for: Li, Juanru
- New search for: Zhang, Yuanyuan
- New search for: Gu, Dawu
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Security analysis of third-party in-app payment in mobile applications
-
Contributors:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2019-07-04
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 48
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Publisher Note| 2019
-
Editorial Board| 2019
-
Sharing information online rationally: An observation of user privacy concerns and awareness using serious gameFatima, Rubia / Yasin, Affan / Liu, Lin / Wang, Jianmin / Afzal, Wasif / Yasin, Awaid et al. | 2019
-
Efficient privacy-preserving authentication framework for edge-assisted Internet of DronesTian, Yifan / Yuan, Jiawei / Song, Houbing et al. | 2019
-
A Cluster Correlation power analysis against double blinding exponentiationWan, Wunan / Chen, Jun / Zhang, Shibing / Xia, Jinyue et al. | 2019
-
Security analysis of third-party in-app payment in mobile applicationsYang, Wenbo / Li, Juanru / Zhang, Yuanyuan / Gu, Dawu et al. | 2019
-
Cognitive security: A comprehensive study of cognitive science in cybersecurityAndrade, Roberto O / Yoo, Sang Guun et al. | 2019
-
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static AssumptionsDatta, Pratish / Dutta, Ratna / Mukhopadhyay, Sourav et al. | 2019
-
A robust domain partitioning intrusion detection methodMwitondi, Kassim S. / Said, Raed A. / Zargari, Shahrzad A. et al. | 2019
-
Human identification after plastic surgery using region based score level fusion of local facial featuresSabharwal, Tanupreet / Gupta, Rashmi et al. | 2019
-
Checking certificate revocation efficiently using certificate revocation guardHu, Qinwen / Asghar, Muhammad Rizwan / Brownlee, Nevil et al. | 2019
-
Reversible data hiding in homomorphically encrypted image using interpolation techniqueMalik, Asad / Wang, Hongxia / Chen, Tailong / Yang, Tianlong / Khan, Ahmad Neyaz / Wu, Hanzhou / Chen, Yanli / Hu, Yi et al. | 2019
-
Toward a secure video watermarking in compressed domainMansouri, Azadeh / Mahmoudi-Aznaveh, Ahmad et al. | 2019
-
A technique for DNA cryptography based on dynamic mechanismsBiswas, Md. Rafiul / Alam, Kazi Md. Rokibul / Tamura, Shinsuke / Morimoto, Yasuhiko et al. | 2019
-
Intrusion response prioritization based on fuzzy ELECTRE multiple criteria decision making techniqueSingh, Dileep Kumar / Kaushik, Praveen et al. | 2019
-
Kernel homomorphic encryption protocolUllah, Shamsher / Li, Xiang Yang / Hussain, Muhammad Tanveer / Lan, Zhang et al. | 2019
-
Usable security for QR codeFocardi, Riccardo / Luccio, Flaminia L. / Wahsheh, Heider A.M. et al. | 2019
-
An effective comparison protocol over encrypted data in cloud computingJiang, Leqi / Cao, Yi / Yuan, Chengsheng / Sun, Xingming / Zhu, Xiaoli et al. | 2019
-
A systematic review on the status and progress of homomorphic encryption technologiesAlloghani, Mohamed / M. Alani, Mohammed / Al-Jumeily, Dhiya / Baker, Thar / Mustafina, Jamila / Hussain, Abir / J. Aljaaf, Ahmed et al. | 2019
-
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysisNunes, Matthew / Burnap, Pete / Rana, Omer / Reinecke, Philipp / Lloyd, Kaelon et al. | 2019
-
Deriving ChaCha20 key streams from targeted memory analysisMcLaren, Peter / Buchanan, William J. / Russell, Gordon / Tan, Zhiyuan et al. | 2019
-
Profile-guided code identification and hardening using return oriented programmingShrivastava, Rajesh Kumar / Hota, Chittaranjan et al. | 2019
-
A highly efficient and secure hardware implementation of the advanced encryption standardMasoumi, M. et al. | 2019
-
A prediction error based histogram association and mapping technique for data embedmentKamal, A.H.M. / Islam, Mohammad Mahfuzul et al. | 2019
-
Attributes revocation through ciphertext puncturationJia, Hongyong / Chen, Yue / Li, Yan / Yan, Xincheng / Liu, Fenlin / Luo, Xiangyang / Wang, Bo et al. | 2019
-
When an attacker meets a cipher-image in 2018: A year in reviewLi, Chengqing / Zhang, Yun / Xie, Eric Yong et al. | 2019
-
Discovering and utilising expert knowledge from security event logsKhan, Saad / Parkinson, Simon et al. | 2019