Do You Trust Your Phone?
暂无分享,去创建一个
[1] Roger Thompson,et al. Why spyware poses multiple threats to security , 2005, CACM.
[2] Francesco Palmieri,et al. Providing true end-to-end security in converged voice over IP infrastructures , 2009, Comput. Secur..
[3] H. Raghav Rao,et al. Consumer-perceived risk in e-commerce transactions , 2003, CACM.
[4] Guillaume Peersman,et al. The Global System for Mobile Communications Short Message Service , 2000, IEEE Personal Communications.
[5] Gigi Karmous-Edwards,et al. A New Era of Presidential Security: The President and His BlackBerry , 2009 .
[6] Lori M. Kaufman,et al. A New Era of Presidential Security: The President and His BlackBerry , 2009, IEEE Security & Privacy.
[7] Choon Seong Leem,et al. Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments , 2005, ICCSA.
[8] David Taniar,et al. Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I , 2005, ICCSA.
[9] Umberto Ferraro Petrillo,et al. An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[10] Umberto Ferraro Petrillo,et al. SPEECH: Secure Personal End-to-End Communication with Handheld , 2006, ISSE.
[11] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2005, CCS '05.
[12] George Lawton. E-mail authentication is here, but has it arrived yet? , 2005, Computer.