Minisymposia-XV Approaches or Methods of Security Engineering (AMSE)-Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--1009 (2006)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,503

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

A legal analysis of human and electronic agents.Steffen Wettig & Eberhard Zehender - 2004 - Artificial Intelligence and Law 12 (1-2):111-135.
Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
Mobile ATM Buffer Capacity Analysis.Stephen Bush, Evans F., B. Joseph & Victor Frost - 1996 - Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.
The role of consumers' trust in online-shopping.Sonja Grabner-Kraeuter - 2002 - Journal of Business Ethics 39 (1-2):43 - 50.

Analytics

Added to PP
2014-01-28

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references