Near field communication

Results: 597



#Item
151What risks are you taking?  Securely Using Your Phone Don’t install applications from unknown sources such as an unofficial app store.

What risks are you taking? Securely Using Your Phone Don’t install applications from unknown sources such as an unofficial app store.

Add to Reading List

Source URL: www.mobilephonesecurity.org

Language: English - Date: 2013-05-14 05:38:11
152TSV10Smart Cards; Test specification for the Host Controller Interface (HCI); Part 1: Terminal features (Release 10)

TSV10Smart Cards; Test specification for the Host Controller Interface (HCI); Part 1: Terminal features (Release 10)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-03-27 05:42:43
153Mobile Payment Security discussion paper Mobile Payment Security discussion paper  Contents

Mobile Payment Security discussion paper Mobile Payment Security discussion paper Contents

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2014-10-05 07:56:36
154GSM Association Official Document NFC.17 - Core Wallet API Non-confidential  Core Wallet API

GSM Association Official Document NFC.17 - Core Wallet API Non-confidential Core Wallet API

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-01-19 12:41:19
155THE ROAD TO CONTACTLESS PAYMENTS EMV, Apple Pay and tokenization Are you ready to handle transactions from a variety of channels? With EMV coming to the US in 2015, all eyes

THE ROAD TO CONTACTLESS PAYMENTS EMV, Apple Pay and tokenization Are you ready to handle transactions from a variety of channels? With EMV coming to the US in 2015, all eyes

Add to Reading List

Source URL: www.ncr.com

Language: English - Date: 2015-04-13 14:06:16
156CASE STUDY: KT MOCA MOBILE WALLET KEY STATISTICS 	 Operator: KT 	 Country: South Korea 	

CASE STUDY: KT MOCA MOBILE WALLET KEY STATISTICS  Operator: KT Country: South Korea 

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-10-15 08:29:40
157Marketing ROI and Location Data A look at current and emerging practices in leveraging Mobile Location Data for marketing attribution and ROI FE B RUA RY 2015

Marketing ROI and Location Data A look at current and emerging practices in leveraging Mobile Location Data for marketing attribution and ROI FE B RUA RY 2015

Add to Reading List

Source URL: www.iab.net

Language: English - Date: 2015-02-18 14:23:42
158PRESS RELEASE  Sistelnetworks S.L. Ronda Narciso Monturiol 6 Building BPaterna

PRESS RELEASE Sistelnetworks S.L. Ronda Narciso Monturiol 6 Building BPaterna

Add to Reading List

Source URL: www.vwand.com

Language: English - Date: 2014-04-14 05:15:07
159APWG Web Vulnerabilities Survey:

APWG Web Vulnerabilities Survey:

Add to Reading List

Source URL: docs.apwg.org

Language: English - Date: 2013-05-13 09:34:00
160Microsoft Word - THINAIRE-KRAFT-REVISE PFMQuote NO SW.docx

Microsoft Word - THINAIRE-KRAFT-REVISE PFMQuote NO SW.docx

Add to Reading List

Source URL: www.newsamerica.com

Language: English - Date: 2013-07-24 09:35:30