3-D Secure

Known as: 3 D Secure, SecureCode, 3D secure 
3-D Secure is an XML-based protocol designed to be an additional security layer for online credit and debit card transactions. It was originally… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1976-2017
020406019762017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Proactive security activities encompass voluntary disclosure concerning information security that firms are taking to improve the… (More)
Is this relevant?
2010
2010
Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New… (More)
  • table I
  • table II
  • figure 1
Is this relevant?
2010
2010
Fraudulent activity on the Internet, in particular the practice known as ‘Phishing’, is on the increase. Although a number of… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2010
2010
Vehicular ad hoc networks are emerging as an effective technology for providing a wide range of safety applications to by-vehicle… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. To reduce the… (More)
  • figure 1
  • table I
  • table III
  • table II
  • table IV
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay… (More)
  • figure I
  • figure 2
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Security is both a feeling and a reality. And they’re not the same. The reality of security is mathematical, based on the… (More)
  • table 1
Is this relevant?
2003
2003
The threat of credit card fraud is arguably the most serious issue of concern to e-commerce participants, including consumers and… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2002
2002
The dawning of the 21st century has seen unprecedented growth in the number of wireless users, applications, and network access… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?