期刊文献+

探讨基于SDKEY的安卓手机安全传输技术

下载PDF
导出
摘要 智能密码钥匙是解决安卓手机间存在的数据传输问题的有效解决方法之一,它能够创造良好的计算环境,针对该系统提出有效的解决办法。这一技术的应用能够改善安卓手机的安全性能,保障用户的信息安全。本文主要以SDKEY为立足点对安卓手机的传输技术进行了有效的分析,提出了一定的解决方案,旨在为安卓系统的改进奠定了良好的基础。
作者 侯玉香
出处 《信息系统工程》 2016年第10期116-117,共2页
  • 相关文献

参考文献2

二级参考文献17

  • 1ISO/IEC 18092.Information Technology-Telecommunicationsand Information Exchange between Systems-Near FieldCommunication—Interface and Protocol(NFCIP-1)[S].1stEd.Geneva,Switzerland:Joint Technical CommitteeISO/IEC,2004. 被引量:1
  • 2Madlmayr G,Dillinger O,Langer J,et al.The benefit ofusing SIM application toolkit in the context of near fieldcommunication applications for mobile applications[C] //Proceedings of the International Conference on theManagement of Mobile Business.Toronto,Canada:IEEE,2007:1-5. 被引量:1
  • 3Au Y A,Kauffman R J.The economics of mobile payments:Understanding stakeholder issues for an emerging financialtechnology application[J].Electronic Commerce Researchand Applications,2008,7(2):141-146. 被引量:1
  • 4Olga K.Apple plans service that lets iphone users pay withhandsets[Z/OL].(2012-04-21),http://www.bloomberg.com/news/2011-01-25/apple-plans-service-that-lets-iphone-users-pay-with-handsets.html. 被引量:1
  • 5Torr P.Demystifying the threat-modeling process[J].IEEESecurity and Privacy,2005,3(5):66-70. 被引量:1
  • 6Shostack A.Threat modeling series 2007[Z/OL].(2012-04-21),http://blogs.msdn.com/sdl/archive/tags/threat+modeling/default.aspx.published 2007-09and 2007-10. 被引量:1
  • 7Swiderski F,Snyder W.Threat Modeling[M].WashingtonDC,USA:Microsoft Press,2004:22-35. 被引量:1
  • 8Poore R S.International information security foundation,generally accepted system security principles release for publiccomment[Z/OL].(2012-04-23),http://www.infosectoday.com/Articles/gassp.pdf accessed on January11,2010. 被引量:1
  • 9Elahi G,Yu E.A goal oriented approach for modeling andanalyzing security trade-offs[C] //Proceedings of the 26thInternational Conference on Conceptual Modeling.Auckland,New Zealand:Springer,2007:375-390. 被引量:1
  • 10Weis S A,Sarma S E,Rivest R L,et al.Security andprivacy aspects of low-cost radio frequency identificationsystems[C] //Proceedings of the Security in PervasiveComputing 2003.Boppard,Germany:Springer,2004:201-212. 被引量:1

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部