Safety technologies impacts survey in M-services security provision
暂无分享,去创建一个
[1] Ulla Koivukoski,et al. Managing Mobile Services: Technologies and Business Practices , 2005 .
[2] D. Brent Chapman,et al. Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.
[3] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.
[4] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[5] Athanasios Karantjias,et al. A Secure Mobile Framework for m-Services , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[6] John A. Clark,et al. A Survey of Authentication Protocol Literature , 2010 .
[7] Perry B. Gentry. What is a VPN? , 2001, Inf. Secur. Tech. Rep..
[8] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[9] Upkar Varshney,et al. Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..
[10] Fatemeh Saghafi,et al. Ranking secure technologies in security provision financial transactions mobile commerce , 2009, ICIS.
[11] Abdullah Al Hasib,et al. Towards Public Key Infrastructure less authentication in Session Initiation Protocol , 2010, ArXiv.
[12] Ray Hunt,et al. A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks , 2008, Int. J. Internet Protoc. Technol..
[13] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .