Research of Mobile Internet Core Security Requirement and Protection
Driven by the technology, service and user demand, the mobile internet has enjoyed rapid development in recent years. However, the mobile internet industry of China is still at the initial stage with its form and pattern remains unclear. Based on the development of mobile internet, an overview of th...
Saved in:
Main Authors: | Fangheng Xu, Xuan Chen, Cailiang Shen, Huanqiang Du |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.11.013/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
by: Rong Yue, et al.
Published: (2013-08-01) -
Analysis of Terminal Security Issue and Solution in Mobile Internet Era
by: Liyun Yan, et al.
Published: (2014-12-01) -
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
by: Frank Moses, et al.
Published: (2023-12-01) -
Overview of the data security and privacy-preserving of mobile cloud services
by: Rui-xuan LI, et al.
Published: (2013-12-01) -
Edwards curves based security authentication protocol for mobile RFID systems
by: Yu-long YANG, et al.
Published: (2014-11-01)