Security of a Mobile Transaction: A Trust Model
暂无分享,去创建一个
[1] Joseph M. Kahn,et al. Imaging diversity receivers for high-speed infrared wireless communication , 1998, IEEE Commun. Mag..
[2] Martin Grötschel,et al. Survivable mobile phone network architectures: models and solution methods , 1998 .
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Juha Mynttinen,et al. End-to-end security of mobile data in GSM , 2000 .
[5] Kaveh Pahlavan,et al. Handoff in hybrid mobile data networks , 2000, IEEE Wirel. Commun..
[6] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[7] William Stallings,et al. Wireless Communications and Networks , 2001, 2020 International Conference on Smart Systems and Technologies (SST).
[8] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[9] Ravi Kalakota,et al. M-Business: The Race to Mobility , 2001 .
[10] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[11] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..