Minisymposia-XV Approaches or Methods of Security Engineering (AMSE)-Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--1009 (2006)
Abstract This article has no associated abstract. (fix it)
Keywords No keywords specified (fix it)
Categories (categorize this paper)
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 38,097
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

A Legal Analysis of Human and Electronic Agents.Steffen Wettig & Eberhard Zehender - 2004 - Artificial Intelligence and Law 12 (1-2):111-135.
Ethical Issues in Electronic Comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
Mobile ATM Buffer Capacity Analysis.Stephen Bush, Evans F., B. Joseph & Victor Frost - 1996 - Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.
The Role of Consumers' Trust in Online-Shopping.Sonja Grabner-Kraeuter - 2002 - Journal of Business Ethics 39 (1-2):43 - 50.

Analytics

Added to PP index
2014-01-28

Total views
0

Recent downloads (6 months)
0

How can I increase my downloads?

Monthly downloads

Sorry, there are not enough data points to plot this chart.

My notes

Sign in to use this feature