期刊文献+

论无线通信网络中个人信息的安全保护 被引量:6

Discussion on Personal Information in the Wireless Communication Network Security Protection
下载PDF
导出
摘要 无线通信网络作为现代通信技术的一个重要组成部分,它的发展已经越来越快,普及的范围也越来越广,在生活中的应用也越来越多。但随之而来的是信息安全的问题在泛滥,人们个人信息传播快,个人信息安全问题得不到保障而引起关注思考,因此无线通信网络的个人信息安全十分重要。文章将在探究无线通信网络的发展与内涵的基础上,说明网络安全与威胁,并分析无线通信网络是如何做到个人信息的安全保护的。 The wireless communication network as an important part of modern communication technology,the development of it has been more and more fast,universal range is becoming more and more wide,more and more application in the life also.But then came the problem of information security in flood,people personal information transmission is fast,personal information security problems aren't caused by the focus on thinking,so wireless personal communication network information security is very important.The article will explore the development and connotation of the wireless communication network,on the basis of network security and threat,and analyzed the wireless communication network is how to achieve the personal information security protection.
作者 刘永庆
出处 《无线互联科技》 2016年第7期27-28,共2页 Wireless Internet Technology
关键词 无线通信网络 个人信息安全保护 wireless communication network personal information security protection
  • 相关文献

参考文献1

二级参考文献11

  • 1DAHLBERG T, MALLAT N, ONDRUS J, et al. Past, present and future of mobile payments research : A literature review [ J]. Electronic Commerce Research and Applications, 2008, 7(2): 165-181.
  • 2HWANG R, SHIAUA S, JANA D. A new mobile payment scheme for roaming services [ J]. Electronic Commerce Research and Applications, 2007, 6 (2):184-191.
  • 3KIM E, KONG M, YI J. Providing secure mobile device pairing based on visual continuation[ EB/OL]. (2009-05- 25 ) [ 2011-04-20 ]. http ://ieeexplore. ieee. org/xpls/abs _all. jsp? anaumber = 5157021tag = 1.
  • 4HASSINEN M, HYPPONEN K, TRICHINA E. Utilizing national public-key infrastructure in mobile payment systems [ J]. Electronic Commerce Research and Applications, 2008, 7(2): 214-231.
  • 5MANULIS M, LEROY D, KOEUNE F. Authenticated wireless roaming via tunnels : making mobile guests feel at home[ EB/OL]. ( 2009-03-10 ) [ 2011-04-20 ]. http: // www. crypo, informatik tu-darmstadt, de/assets/PublicatimVMalekoBoQuASIACCS09, pdf.
  • 6SIMON D, ABOBA B, HURST R. The EAP-TLS authentication protocol [ EB/OL ]. ( 2008-03-19 ) [ 2011-04-21 ]. http : tools, ietf. org/html/rfc5216.
  • 7PENG H X. An identity-based authentication model for multi-domain [ EB/OL ]. ( 2008-05-14 ) [ 2011-04-201. http:www, hpi. uni-potsdam, de/mcine/team/chcng, html.
  • 8ZHANG G, CHENG F,MEINELL C. Towards secure mobile payment based on SIP [ EB/OL]. (2008-05-14) [ 2011-04-20 ]. http: www. hpi. uni-potsdam, de/meine/ tearn/cheng, html.
  • 9LU H, CLARET F, CHRIS R, CHATWIN, et al. An agent-oriented mobile payment ystem secured using a bio- metrics approach [ J]. International Journal of Agent-Oriented Software Engineering. 2009, 3 (2-3) : 163-187.
  • 10CHEN C, LIU L, HORNG G. A server-aided signature scheme based on secret sharing for mobile commerce [ J]. Journal of Computers ,2008, 19( 1 ) :61-70.

同被引文献12

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部