Works matching DE "ELECTRONIC funds transfer security"
1
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 1304
- Article
2
- Journal of Counterterrorism & Homeland Security International, 2018, v. 24, n. 3, p. 8
- Article
3
- Human Systems Management, 2001, v. 20, n. 2, p. 139, doi. 10.3233/hsm-2001-20207
- Chen, Kuo Lane;
- Lee, Huei;
- Mayer, Bradley Wayne
- Article
4
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 1, p. 97, doi. 10.18372/2225-5036.20.6581
- Article
5
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0076-9
- Sitek, Albert;
- Kotulski, Zbigniew
- Article
6
- Intellectual Economics, 2010, v. 2, n. 8, p. 21
- Dzemydienė, Dalė;
- Naujikienė, Ramutė;
- Kalinauskas, Marius;
- Jasiūnas, Eugenijus
- Article
7
- Trends & Issues in Crime & Criminal Justice, 1997, n. 71, p. 1
- Article
8
- Electronic Commerce Research, 2018, v. 18, n. 2, p. 339, doi. 10.1007/s10660-016-9236-5
- Article
9
- Financial Space, 2014, n. 4, p. 101
- Article
10
- CDS Review, 2011, v. 104, n. 3, p. 14
- Article
11
- Nacha Operating Rules & Guidelines, 2020, p. OR3
- Article
12
- ISSA Journal, 2016, v. 14, n. 9, p. 25
- Article
13
- ISSA Journal, 2016, v. 14, n. 9, p. 14
- Article
14
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2476, doi. 10.1002/sec.1517
- Chang, Chin-Chen;
- Chen, Wei-Yi;
- Chang, Shih-Chang
- Article
15
- Gerencia Tecnologica Informatica, 2015, v. 14, n. 38, p. 75
- GAMA MORENO, LUIS ANTONIO;
- TORRES RODRÍGUEZ, JOSE LUIS;
- TORRES RANGEL, JOSE ANGEL
- Article
16
- Journal of Computer Science & Control Systems, 2009, v. 2, n. 2, p. 16
- Jurcut, Anca;
- Coffey, Tom;
- Dojen, Reiner;
- Gyorodi, Robert
- Article
17
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 1, doi. 10.1007/s11277-017-4261-9
- Chen, Xinyi;
- Choi, Kyung;
- Chae, Kijoon
- Article
18
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5267, doi. 10.1007/s11277-016-3740-8
- Liu, Yining;
- Zhao, Quanyu;
- Liu, Gao;
- Chang, Liang;
- Shen, Jian
- Article
19
- Wireless Personal Communications, 2013, v. 73, n. 4, p. 1421, doi. 10.1007/s11277-013-1258-x
- Jung, Jin-Hyuk;
- Kim, Ju Young;
- Lee, Hyeong-Chan;
- Yi, Jeong Hyun
- Article
20
- Brief, 2017, v. 46, n. 4, p. 63
- Article
21
- Federal Reserve Bulletin, 2000, v. 86, n. 8, p. 582
- Article
22
- International Journal of Information Security, 2014, v. 13, n. 1, p. 63, doi. 10.1007/s10207-013-0207-8
- Gonzalez Granadillo, Gustavo;
- Belhaouane, Malek;
- Debar, Hervé;
- Jacob, Grégoire
- Article
23
- International Journal of Information Security, 2014, v. 13, n. 3, p. 271, doi. 10.1007/s10207-014-0240-2
- Lian, Bin;
- Chen, Gongliang;
- Li, Jianhua
- Article
24
- Journal of International Commercial Law & Technology, 2011, v. 6, n. 4, p. 187
- Zulhuda, Sonny;
- Azmi, Ida Madieha Abdul Ghani
- Article
25
- Duke Law & Technology Review, 2015, v. 14, n. 1, p. 89
- Article
26
- Indian Journal of Public Health Research & Development, 2017, v. 8, n. 3, p. 170, doi. 10.5958/0976-5506.2017.00181.4
- Article
27
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 620, doi. 10.1007/s12083-012-0183-1
- Almuairfi, Sadiq;
- Veeraraghavan, Prakash;
- Chilamkurti, Naveen;
- Park, Doo-Soon
- Article
28
- Journal of Payments Strategy & Systems, 2018, v. 12, n. 1, p. 74, doi. 10.69554/fgrr1744
- Sekantsi, Lira Peter;
- Lechesa, Motheo Ernest
- Article