MobiS: A Solution for the Development of Secure Applications for Mobile Devices
暂无分享,去创建一个
Rossana M. de Castro Andrade | Windson Viana | José Bringel Filho | Katy C. P. Magalhães | C. Giovano | J. de Castro
[1] P. R. Kasselman. A fast attack on the MD4 hash function , 1997, Proceedings of the 1997 South African Symposium on Communications and Signal Processing. COMSIG '97.
[2] Ayman I. Kayssi,et al. J2ME end-to-end security for M-commerce , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[3] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[4] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[5] Uday S. Murthy,et al. Firewalls for security in wireless networks , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[6] John Gilmore,et al. Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .
[7] Vipul Gupta,et al. Experiments in wireless Internet security , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).