[1] K. Siau, E.-P. Lim, and Z. Shen, "Mobile Commerce: Promises, Challenges and Research Agenda," ed: IGI Global, 2001, pp. 4-13.
[2] G. Xu and J. A. Gutierrez, "An Exploratory Study of Killer Applications and Critical Success Factors in M-Commerce", ed: IGI Global, 2006, pp.63-79.
[3] Jin Nie and Xianling Hu. Mobile Banking Information Security and Protection Methods, Computer Science and Software Engineering, 2008 International Conference , pp. 587-590, 2008.
[4] Suraj, sankaran, “Mobile Banking Architecture :Palisade”, http://palisade.plynt.com / issues /2007May / mobile-banking / ,MAY, 2007.
[5] R. Fisher, Business aspects of trusted third party services in Europe, Information Technology Applications in Biomedicine, IT IS - ITAB ' 99. IEEE EMBS International Conference, pp. 38-39, 1999.
[6] S. Alam, H. Kabir, M. Sakib, A. Sazzad, C. Shahnaz, and S. Fattah, A secured electronic transaction scheme for mobile banking Bangladesh incorporating digital watermarking, Information Theory and Information
International Journal of Science and Engineering Investigations, Volume 2, Issue 18, July 2013 147
www.IJSEI.com Paper ISSN: 2251-8843 ID: 21813-21
Security (ICITIS), 2010 IEEE International Conference on, pp. 98-102, 2010.
[7] D. Buchholz,A. Cavazos-Wright, ”Consumers andMobile Financial Services 2013”, Board of Governors of the Federal Reserve System, Washington, DC 20551 , 2013.
[8] V. Chugh, ”Master Circular - Mobile Banking Tansactions in India - Operative Guidelines for Banks”,2013.
[9] V. Pegueros, ”Security of Mobile Banking and Payments”, SANS Institute InfoSec Reading Room, 2012.
[10] Davis, A., 2011, Securing consumer devices. Information Security Forum, (April). Esmaili, E. et al., 2011. The Role of Trust and Other Behavioral Intention Determinants on Intention toward Using Internet Banking. International Journal of Innovation, Management and Technology, 2(1), pp.95-100. Available at: http://www.ijimt.org/papers/111-E00102.pdf [Accessed January 3, 2012].
[11] M. Elkhodr, ”A Proposal to Improve the Security of Mobile Banking Applications”, 2012 Tenth International Conference on ICT and Knowledge Engineering, 2012.
[12] C. Jianmin, ” Research on Behavior-based Detection Method for Mobile Application Security”, 2012 International Conference on Industrial Control and Electronics Engineering, 2012.
[13] V. Goyal, D. Pandey, ”Mobile Banking in India: Practices,Challenges and Security Issues”, International Journal of Advanced Trends in Computer Science and Engineering, 2012.
[14] D. Weerasinghe, V.Rakocevic, M. Rajarajan, ”Security Framework for Mobile Banking”, book chapter, 2013.
[15] I. Ashraf, ”Mobile Banking Security”, Post Graduate IT Audit - Vrije Universiteit, Amsterdam Student number 2043068 Thesis number 1073 The Hague, The Netherlands, April 2012.
Thank you for copying data from http://www.arastirmax.com