References
[1]. Al-Ashban, A.A. and Burney, M.A. (2001). Customer
adoption of tele-banking technology: the case of Saudi
Arabia, International Journal of Bank Marketing, Vol.19
(5), pp. 191-200.
[2]. Amir Herzberg. (2003). Payments And Banking With
Mobile Personal Devices, Communications of the ACM,
Vol. 46, No. 5, May.
[3]. Banzal S. (2010). Mobile Banking & M–Commerce
and Related issues, www. public.webfoundation.org/…....
/25, Mobile_banking_M-commerce_15.03.pdf.
[4]. Barnes,S.J., and Corbitt, B. (2003). Mobile Banking:
Concept and Potential, International Journal of Mobile
Communications, Vol.1 (3), pp. 273-288.
[5]. Black, N. J., Lockett, A., Ennew, C., Winklhofer, H. and
McKechnie, S. (2002). Modeling consumer choice of
distribution channels: An illustration from financial
services, International Journal of Bank Marketing,
Vol.20(4), pp.161- 173.
[6]. C. Narendiran, S. Albert Rabara, and N. Rajendran.
(2009). Public key infrastructure for mobile banking
security, Global Mobile Congress 2009, pp. 1-6.
[7]. C. Narendiran, S. Rabara, and N. Rajendran, (2008).
Performance evaluation on end-to-end security
architecture for mobile banking system, Wireless Days,
2008. WD '08. 1st IFIP, pp. 1-5.
[8]. Comninos, A., Esselaar, S., Ndiwalana, A. And Stork,
C. (2008). Towards evidence-based ICT policy and
regulation mobile banking the unbanked, http://
externo.casafrica. es/aeo/pdf/english / overview_part_
2_09_aeo_09.pdf.
[9]. Dai Wei and Tang Yanling. (2010). Research on
Security Payment Technology Based on Mobile, Mobile ECommerce,
e-Business and Information System Security
(EBISS), pp.1- 4.
[10]. Dian Yan Liou. (2008). Four - scenario analysis for
mobile banking development contextualized to Taiwan,
Management of Engineering & Technology, PICMET, pp.
2634-2642.
[11]. F. de la Puente, S. Gonzalez, and J. Sandoval.
(1999). Virus attack to the PC bank, Security Technology
Proceedings. IEEE 33rd Annual 1999 International
Carnahan Conference, pp. 304-310.
[12]. H. Harb, H. Farahat, and M. Ezz. (2008). Secure SMS
Pay: Secure SMS Mobile Payment model, Anti -
counterfeiting, Security and Identification ASID, pp. 11-
17.
[13]. H. Wu, A. Burt, and R. Thurimella. (2003). Making
secure TCP connections resistant to server failures,
Computer Security Applications Conference 2003,
Proceedings. 19th Annual, pp. 197-206.
[14]. Hayat Muhammad Aslam. (2009). Mobile payments
: Will Colombo keep its leadership in South Asia?,
http://sundaytimes.lk/090712/FinancialTimes/ft323.html.
[15]. I. Brown, Z. Cajee, D. Davies, and S. Stroebel. (2003).
Cell phone banking: predictors of adoption in South
Africa-an exploratory study, International Journal of
Information Management, Vol.23, pp. 381-394, Oct.