MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "a78614d3-b19e-4319-9efc-96eb5ed8b16b"}, "_deposit": {"id": "3505", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3505"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3505", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Infrastructure-Based Protection of Unauthorized Access on M-Commerce", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile devices such as Laptops, PDAs mobile phones and other handheld devices which can support the wireless communication. Consequently, these devices will play an increasing role in M-Commerce (Mobile Commerce) technology. M-Commerce offers the possibility of an entire new level of financial flexibility, taking advantages of both social and technological developments. As M-Commerce platforms mature, grow in popularity and store valuable information, hackers are also stepping their evil efforts on these field. This paper focuses on security aspects to protect against threat of M-Commerce and since M-Commerce is based on infrastructure mode and all the important data are passed through on air medium, it has lots of vulnerabilities which can be a chance for an unauthorized user to attack the valuable data of M-Commerce. Therefore, this paper specifies how to care for the above aspects by using WPA (Wi-Fi Protected Access) protocol."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "WPA"}, {"interim": "wireless"}, {"interim": "threat"}, {"interim": "vulnerabilities"}, {"interim": "Mobile Commerce"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-24"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (46).pdf", "filesize": [{"value": "249 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 249000.0, "url": {"url": "https://meral.edu.mm/record/3505/files/psc2010paper (46).pdf"}, "version_id": "2da615dd-8127-44f5-b206-9cf9d8e09a7f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, Theint Zarni"}, {"subitem_authors_fullname": "Win, Su Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1249"}, "item_title": "Infrastructure-Based Protection of Unauthorized Access on M-Commerce", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003505", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-24"}, "publish_date": "2019-07-24", "publish_status": "0", "recid": "3505", "relation": {}, "relation_version_is_last": true, "title": ["Infrastructure-Based Protection of Unauthorized Access on M-Commerce"], "weko_shared_id": -1}
Infrastructure-Based Protection of Unauthorized Access on M-Commerce
http://hdl.handle.net/20.500.12678/0000003505
http://hdl.handle.net/20.500.12678/00000035058b2e8671-704f-4df6-af18-ee42adc7b773
a78614d3-b19e-4319-9efc-96eb5ed8b16b
Name / File | License | Actions |
---|---|---|
psc2010paper (46).pdf (249 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Infrastructure-Based Protection of Unauthorized Access on M-Commerce | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Myint, Theint Zarni | ||||||
Win, Su Su | ||||||
Description | ||||||
Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile devices such as Laptops, PDAs mobile phones and other handheld devices which can support the wireless communication. Consequently, these devices will play an increasing role in M-Commerce (Mobile Commerce) technology. M-Commerce offers the possibility of an entire new level of financial flexibility, taking advantages of both social and technological developments. As M-Commerce platforms mature, grow in popularity and store valuable information, hackers are also stepping their evil efforts on these field. This paper focuses on security aspects to protect against threat of M-Commerce and since M-Commerce is based on infrastructure mode and all the important data are passed through on air medium, it has lots of vulnerabilities which can be a chance for an unauthorized user to attack the valuable data of M-Commerce. Therefore, this paper specifies how to care for the above aspects by using WPA (Wi-Fi Protected Access) protocol. | ||||||
Keywords | ||||||
WPA, wireless, threat, vulnerabilities, Mobile Commerce | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1249 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |