Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications

Files in this item

This item appears in the following Collection(s)

Search DSpace


Browse

My Account