Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    E-AAPIV: Merkle Tree-Based Real-Time Android Manifest Integrity Verification for Mobile Payment Security

    Mostafa Mohamed Ahmed Mohamed Alsaedy1,*, Atef Zaki Ghalwash1, Aliaa Abd Elhalim Yousif2, Safaa Magdy Azzam1

    Journal of Cyber Security, Vol.7, pp. 653-674, 2025, DOI:10.32604/jcs.2025.073547 - 24 December 2025

    Abstract Mobile financial applications and payment systems face significant security challenges from reverse engineering attacks. Attackers can decompile Android Package Kit (APK) files, modify permissions, and repackage applications with malicious capabilities. This work introduces E-AAPIV (Enhanced Android Apps Permissions Integrity Verifier), an advanced framework that uses Merkle Tree technology for real-time manifest integrity verification. The proposed system constructs cryptographic Merkle Tree from AndroidManifest.xml permission structures. It establishes secure client-server connections using Elliptic Curve Diffie-Hellman Protocol (ECDH-P384) key exchange. Root hashes are encrypted with Advanced Encryption Standard-256-Galois/Counter Mode (AES-256-GCM), integrated with hardware-backed Android Keystore for enhanced security. More >

  • Open Access

    ARTICLE

    A Structural Topic Model for Exploring User Satisfaction with Mobile  Payments

    Jang Hyun Kim1,2,3, Jisung Jang1,3, Yonghwan Kim4, Dongyan Nan1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3815-3826, 2022, DOI:10.32604/cmc.2022.029507 - 16 June 2022

    Abstract This study explored user satisfaction with mobile payments by applying a novel structural topic model. Specifically, we collected 17,927 online reviews of a specific mobile payment (i.e., PayPal). Then, we employed a structural topic model to investigate the relationship between the attributes extracted from online reviews and user satisfaction with mobile payment. Consequently, we discovered that “lack of reliability” and “poor customer service” tend to appear in negative reviews. Whereas, the terms “convenience,” “user-friendly interface,” “simple process,” and “secure system” tend to appear in positive reviews. On the basis of information system success theory, we… More >

  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065 - 26 October 2021

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC… More >

Displaying 1-10 on page 1 of 3. Per Page