An exploration of wireless computing risks: Development of a risk taxonomy
暂无分享,去创建一个
[1] Marko Suoknuuti,et al. Introduction to Mobile Internet Technical Architecture , 2002, Wirel. Pers. Commun..
[2] Upkar Varshney,et al. Mobile Commerce: Framework, Applications and Networking Support , 2002, Mob. Networks Appl..
[3] Robert C. Nickerson,et al. Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..
[4] Troy J. Strader,et al. Where in the World on the Web Does Location Matter? A Framework for Location Based Services in M-Commerce , 2001 .
[5] Dongsong Zhang,et al. Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology , 2003, Commun. Assoc. Inf. Syst..
[6] Muhammed A. Badamas. Mobile computer systems - security considerations , 2001, Inf. Manag. Comput. Secur..
[7] Elsabé Cloete,et al. Classification of malicious host threats in mobile agent computing , 2002 .
[8] Diomidis Spinellis,et al. Security architectures for network clients , 2003, Inf. Manag. Comput. Secur..
[9] Gordon A. Manson,et al. Networks security measures using neuro-fuzzy agents , 2003, Inf. Manag. Comput. Secur..
[10] Sudhir S. Dixit. Wireless IP and Its Challenges for the Heterogeneous Environment , 2002, Wirel. Pers. Commun..
[11] Upkar Varshney. Mobile and Wireless Information Systems: Applications, Networks, and Research Problems , 2003, Commun. Assoc. Inf. Syst..
[12] Asuman Dogac,et al. Issues in Mobile Electronic Commerce , 2002, J. Database Manag..
[13] Robert Boncella. Wireless Security: An Overview , 2002, Commun. Assoc. Inf. Syst..
[14] Imran Bashir,et al. Securing network software applications: introduction , 2001, CACM.
[15] Sridhar P. Nerur,et al. A framework for analyzing e-commerce security , 2002, Inf. Manag. Comput. Secur..
[16] Hideki Imai,et al. Security in Wireless Communication , 2002, Wirel. Pers. Commun..
[17] Ravi Sankar,et al. Demystifying Wireless Technologies: Navigating Through The Wireless Technology Maze , 2003, Commun. Assoc. Inf. Syst..
[18] Partha Dasgupta,et al. Secure wireless gateway , 2002, WiSE '02.
[19] Marc Engels. Technology Challenges in the Development of Wireless Personal Area Networks , 2002, Wirel. Pers. Commun..
[20] Kingpin Kingpin,et al. Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats , 2001, USENIX Security Symposium.
[21] Upkar Varshney,et al. Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..
[22] Upkar Varshney,et al. Mobile and Wireless Networks , 2000 .
[23] Robert C. Nickerson,et al. Wireless/Mobile E-Commerce: Technologies, Applications, and Issues , 2001 .