23
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Security in mobile wallets

      research-article

        , 1

      ScienceOpen Posters

      ScienceOpen

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We will start by analysing a threat model of a mobile payment application to obtain a high level understanding of the various types of threat that may affect mobile payment applications. We will then analyse the security features that various commercial mobile payment applications have implemented. Finally, we will discuss emerging attacks targeting mobile payment applications and countermeasures that application developers.

          Related collections

          Author and article information

          Journal
          ScienceOpen Posters
          ScienceOpen
          26 November 2020
          Affiliations
          [1 ] Karunya institute of technology
          Article
          10.14293/S2199-1006.1.SOR-.PPX2CRU.v1

          This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

          The data that support the findings of this study are available from file:///C:/Users/koushik/OneDrive/Attachments/WP2016%203-1%204%20Mobile%20Payments%20Security.pdf but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of file:///C:/Users/koushik/OneDrive/Attachments/WP2016%203-1%204%20Mobile%20Payments%20Security.pdf.

          Computer science

          Comments

          Comment on this article