Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "a78614d3-b19e-4319-9efc-96eb5ed8b16b"}, "_deposit": {"id": "3505", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3505"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3505", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Infrastructure-Based Protection of Unauthorized Access on M-Commerce", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile devices such as Laptops, PDAs mobile phones and other handheld devices which can support the wireless communication. Consequently, these devices will play an increasing role in M-Commerce (Mobile Commerce) technology. M-Commerce offers the possibility of an entire new level of financial flexibility, taking advantages of both social and technological developments. As M-Commerce platforms mature, grow in popularity and store valuable information, hackers are also stepping their evil efforts on these field. This paper focuses on security aspects to protect against threat of M-Commerce and since M-Commerce is based on infrastructure mode and all the important data are passed through on air medium, it has lots of vulnerabilities which can be a chance for an unauthorized user to attack the valuable data of M-Commerce. Therefore, this paper specifies how to care for the above aspects by using WPA (Wi-Fi Protected Access) protocol."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "WPA"}, {"interim": "wireless"}, {"interim": "threat"}, {"interim": "vulnerabilities"}, {"interim": "Mobile Commerce"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-24"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (46).pdf", "filesize": [{"value": "249 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 249000.0, "url": {"url": "https://meral.edu.mm/record/3505/files/psc2010paper (46).pdf"}, "version_id": "2da615dd-8127-44f5-b206-9cf9d8e09a7f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, Theint Zarni"}, {"subitem_authors_fullname": "Win, Su Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1249"}, "item_title": "Infrastructure-Based Protection of Unauthorized Access on M-Commerce", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003505", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-24"}, "publish_date": "2019-07-24", "publish_status": "0", "recid": "3505", "relation": {}, "relation_version_is_last": true, "title": ["Infrastructure-Based Protection of Unauthorized Access on M-Commerce"], "weko_shared_id": -1}

Infrastructure-Based Protection of Unauthorized Access on M-Commerce

http://hdl.handle.net/20.500.12678/0000003505
8b2e8671-704f-4df6-af18-ee42adc7b773
a78614d3-b19e-4319-9efc-96eb5ed8b16b
None
Name / File License Actions
psc2010paper psc2010paper (46).pdf (249 Kb)
Publication type
Article
Upload type
Publication
Title
Title Infrastructure-Based Protection of Unauthorized Access on M-Commerce
Language en
Publication date 2010-12-16
Authors
Myint, Theint Zarni
Win, Su Su
Description
Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile devices such as Laptops, PDAs mobile phones and other handheld devices which can support the wireless communication. Consequently, these devices will play an increasing role in M-Commerce (Mobile Commerce) technology. M-Commerce offers the possibility of an entire new level of financial flexibility, taking advantages of both social and technological developments. As M-Commerce platforms mature, grow in popularity and store valuable information, hackers are also stepping their evil efforts on these field. This paper focuses on security aspects to protect against threat of M-Commerce and since M-Commerce is based on infrastructure mode and all the important data are passed through on air medium, it has lots of vulnerabilities which can be a chance for an unauthorized user to attack the valuable data of M-Commerce. Therefore, this paper specifies how to care for the above aspects by using WPA (Wi-Fi Protected Access) protocol.
Keywords
WPA, wireless, threat, vulnerabilities, Mobile Commerce
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1249
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats