Secure mobile business applications - framework, architecture and implementation
暂无分享,去创建一个
Laurent Bussard | Yves Roudier | Jochen Haller | Roger Kilian-Kehr | Joachim Posegga | Philip Robinson | Thomas Walter | Roger Kilian-Kehr | Laurent Bussard | J. Posegga | T. Walter | Y. Roudier | P. Robinson | J. Haller
[1] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[2] Bernhard H. Walke. Mobile Radio Networks: Networking, Protocols and Traffic Performance, 2nd Edition , 2001 .
[3] Scott Oaks,et al. JXTA in a Nutshell , 2002 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Cristina V. Lopes,et al. Aspect-oriented programming , 1999, ECOOP Workshops.
[6] Bernhard Walke. Mobile Radio Networks: Networking and Protocols , 1999 .
[7] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] Bernhard Walke,et al. Mobile Radio Networks , 1999 .
[10] Nokia,et al. Network Working Group Extensible Authentication Protocol Method for Gsm Subscriber Identity Modules (eap-sim) , 2004 .
[11] Philip Robinson,et al. Security and trust issues in ubiquitous environments - the business-to-employee dimension , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..
[12] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.