

Publisher: IGI Global_journal
E-ISSN: 1937-9668|8|1|30-40
ISSN: 1937-965x
Source: International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), Vol.8, Iss.1, 2016-01, pp. : 30-40
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
With the widespread use pay treasures, which occupy an increasingly large daily, the proportion of third-party payment, pay treasure security issues become more and more prominent. So, how to better respond to Alipay security risks, how to improve its security, these are very important to discuss the contents. This article briefly learn Alipay technical processes missing from the mobile phone, Internet and transaction worries wireless network vulnerabilities, a brief description of the security issues Alipay, and put forward relevant measures in the third chapter of governance.
Related content






By Panopoulos Georgios D Booth Richard T
Policy and Practice in Health and Safety, Vol. 5, Iss. 1, 2007-05 ,pp. :

