期刊文献+

有关移动网络在信息安全方面的几点分析

Analysis of Information Security in Mobile Network
下载PDF
导出
摘要 随着人类智慧水平的提高,如今人们已全速迈进了信息时代。以移动网络为中心的智能手机、平板电脑等移动终端设备已完全融入人们生活的方方面面,丰富了人们的生活。对此,笔者对移动网络在信息安全方面的具体问题进行了深刻剖析,并相应提出了优化信息安全的策略,望对人们的信息安全有保障作用。 With the improvement of the level of human intelligence, people have entered the information age at full speed. With mobile network as the center, the mobile terminal equipment, such as tablet computer, has fully integrated into people's life and inject a lot of colorful elements into people's life. In this regard, the author makes a deep analysis of the specific problems of the mobile network in information security, and puts forward the corresponding strategies to optimize the information security. It is expected to have some guiding significance to ensure the information security of the people.
作者 冯玲莉 Feng Lingli(Anhui Institute of Electron Production Supervision and Inspection, Hefei Anhui 230061, China)
出处 《信息与电脑》 2018年第10期164-166,共3页 Information & Computer
关键词 移动网络 信息安全 病毒入侵 mobile network information security virus invasion
  • 相关文献

参考文献5

二级参考文献41

  • 1杨斌,刘海涛.云计算对移动互联网发展的助推作用[J].电信工程技术与标准化,2010,23(12):16-19. 被引量:13
  • 2尚帅.第四代移动通信系统(4G)关键技术及安全威胁综述[J].保密科学技术,2011(3):50-53. 被引量:10
  • 3姜春祥.通信网络安全 技术是关键[J].网络安全技术与应用,2005(12):66-66. 被引量:10
  • 4姜滨,于湛.通信网络安全与防护[J].甘肃科技,2006,22(12):84-85. 被引量:35
  • 5LEI Min,BI Hai.FENG Zhengjin.Security Architecture and Mechanism of Third Generation Mobile Communication[C] //Proceedings of the 2002 IEEE Region 10 Conference on Conference on Computers,Communications,Control and Power Engineering(TENCON'02):Vol 2,Oct 28-31,2002,Beijing,China.Piscataway,NJ,USA:IEEE,2002:613-816.
  • 6YANG Hao,RICCIATO F,LU Songwu,et al.Securing a Wireless World[J].Proceedings of the IEEE,2006,94(2):442-454.
  • 7ZHENG Yu,HE Dake,YU Weichi,et al.Trusted Computing-Based Security Architecture for 4G Mobile Networks[C)//Proceedings of the 6th International Conference on Parallel and Distributed Computing,Applications and Technologies(PDCAT'05),Dec 5-8,2005,Dalian,China.Los Alamitos,CA,USA:IEEE Computer Society,2005:251-255.
  • 8AL-FAYOUMl M,NASHWAN S,YOUSEF S,et al.A New Hybrid Approach of Symmetic/ Asymmetric Authentication Protocol for Future Mobile Networks[J].Proceedings of the 3rd lEEE International Conference on Wireless and Mobile Computing,Networking and Communications(WIMOB'07),Oct 8-10,2007,Whire Plains,NY,USA.Piscataway,NJ,USA:lEEE,2007:29.
  • 9AL-MUHTADI J,MICKUNAS D,ROY CAMPBELL R.A Lightweight Reconfigurable Security Mechanism for 3G,4G Mobile Devices[J].IEEE Wireless Communications.2002,9(2):60-65,.
  • 10ZHANG Muxiang,FANG Yuguang.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol[J].IEEE Transactions on Wireless Communications,2005,4(2):734-743.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部