Transaction Security Using Input Based Shared Key Cryptography
暂无分享,去创建一个
[1] Z.T. Abdul-Mehdi,et al. Multi-Check-Out Timestamp Order Technique (MCTO) for Planned Disconnections in Mobile Database , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[2] Abdelsalam Helal,et al. A mobile transaction model that captures both the data and movement behavior , 1997, Mob. Networks Appl..
[4] R. Mahmod,et al. Security Management Model for Mobile Databases Transaction Management , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[5] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .