Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms
暂无分享,去创建一个
Craig Valli | Andrew Woodward | Peter Hannay | Clinton Carpene | Michael N. Johnstone | Michael N. Johnstone | C. Valli | A. Woodward | P. Hannay | Clinton Carpene
[1] Stefan Poslad,et al. Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .
[2] Yan Li,et al. Market structure, regulation and the speed of mobile network penetration , 2012 .
[3] Peter James,et al. The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops , 2012 .
[4] Richard N. Clarke. Expanding Mobile Wireless Capacity: The Challenges Presented by Technology and Economics , 2013 .
[5] Richard J. Enbody,et al. Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.