期刊文献+

移动网络个人隐私保护的研究——以高校学生为例 被引量:3

Research of Privacy Protection in Mobile Internet Based on Survey of University Students
下载PDF
导出
摘要 近年来,随着移动网络的广泛应用,越来也多的个人隐私信息也暴露在公众中。首先,论文在大学生群体中组织个人隐私问卷调查,然后对一些关键的问题进行分析,包括了移动终端与信息泄露的联系、用户行为与信息泄露的联系等。最后建立一个隐私安全模型,模型运作在移动终端、应用服务提供商端和网络运营商中。模型的目的是确保基于不同隐私等级隐私的安全。 In recent years, with the rapid development of mobile internet, more and more private information is leaked in public. Firstly, this paper conducts a questionnaire survey of private information around university students. And then some key points are tired to be analyzed, including the relationship between terminal devices and privacy disclosure, the relationship between users’ behaviors and privacy disclosure, etc. Finally, the model of privacy security is established, which runs at mobile terminal, application service providers and network operators, in order to keep private information security in different privacy levels.
出处 《网络空间安全》 2017年第6期33-36,共4页 Cyberspace Security
基金 广东金融学院校级研究课题(16XJ02-07)
关键词 移动网络 隐私泄露 安全模型 隐私等级 评分系统 nmobile internet information disclosure security model privacy levels scores system
  • 相关文献

参考文献4

二级参考文献40

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 5JIANG Y X, LIN C, SHEN X M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks [J]. IEEE Transactions on Wireless Communications, 2006, 5(9):2569- 2577.
  • 6YANG G M, WONG D S, DENG X T. Anonymous and authenticated key exchange for roaming networks [J]. IEEE Transactions on Wireless Communications, 2007, 6(9):1035-1042.
  • 7YANG G M, WONG D S, DENG X T. Formal security definition and efficient construction for roaming with a privacy-preserving extension[J]. Journal of Universal Computer Science, 2008, 14(3): 441-462.
  • 8SHIM H, RUTAGEMWA H, SHEN X M. A service-agent-based roaming architecture for WLAN/cellular integrated networks[J]. IEEE Transactions on Vehicular Technology, 2007, 56(5):3168-3181.
  • 9JIANG J, HE C, and JIANG L. On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access[A]. Proc International Conference on Commu- nications, Networking and Mobile Computing (ICCNMC 05)[C]. Sptinger-Verlag, 2005.972-981.
  • 10WAN Z, REN K, PRENEET B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks[A]. Proceedings of the First ACM Conference on Wireless Network Security (ACM WiSec 2008)[C]. Alexandria, Virginia, USA, 2008.62-67.

共引文献74

同被引文献66

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部