Security in Mobile Communications: Challenges and Opportunities
暂无分享,去创建一个
[1] Audun Jøsang,et al. Authentication for Humans , 2001 .
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Wayne A. Jansen. Guidelines on Active Content and Mobile Code | NIST , 2001 .
[4] David Naccache,et al. Cut and Paste Attacks with Java , 2002, IACR Cryptol. ePrint Arch..
[5] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[6] Paul F. Syverson,et al. Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.