期刊文献+

基于移动互联终端的交互式广告应用探析 被引量:1

Research of Interactive Advertising Based on Mobile Internet Terminal
下载PDF
导出
摘要 随着新媒体技术的迅猛发展,便捷的移动互联终端越来越受到广告行业的青睐。在渠道和目标群定位方面,移动网络终端设备的信息反馈能力为交互式广告的投放和效果反馈供了更详尽的依据。文章分析和研究了移动互联终端在交互式广告应用领域的巨大实用价值。 The rapid development of new media technology,advertising industry pays more attention to mobile internet terminal for its convenience. In terms of channels and target groups,the information feedback ability of the mobile network terminal equipment provides a more detailed basis for interactive advertising. This paper analyzes and studies the great practical value of the mobile network terminal equipment in the field of interactive advertising.
作者 刘纯丽 LIU Chun-li(Chizhou University,Chizhou 247000,China)
出处 《哈尔滨学院学报》 2018年第9期68-71,共4页 Journal of Harbin University
基金 安徽省教育厅自然科学研究重点项目 项目编号:KJ2016A517 池州学院自然科学研究重点项目 项目编号:2016ZRZ013
关键词 移动互联终端 交互式广告 广告形式 数据挖掘 安全性 Mobile Internet Terminal;interactive advertising;advertising format;data mining;security
  • 相关文献

参考文献4

二级参考文献195

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 3Kesdogan D and Palmer C. Technical challenges of network anonymity[J]. Computer Communications, 2006, 29(3): 306-324.
  • 43GPP TS 33.102 V8.1.0. Policy and charging control architecture[S]. Release 8, 2008 -12.
  • 5Wu Chia-chun and Lee Wei-bin, et al.. A secure authentication scheme with anonymity for wireless communications[J]. IEEE Communications Letters, 2008, 12 (10): 722- 723.
  • 6Zhu Jian-ming and Ma Jian-feng. A new authentication scheme with anonymity for wireless environment[J]. IEEE Transactions on Consumer Electronic, 2004, 50(1): 231 -235.
  • 7Lee J S and Chang J H. Security flaw of authentication scheme with anonymity for wireless communications[J]. IEEE Communications Letters, 2009, 13(5): 292- 293.
  • 8Wong D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[C] Third IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, Hawaii, USA, 2005:284- 288.
  • 9Zeng Peng and Cao Zhen-fu, ct al.. On the anonymity of some authentication schemes for wireless communications[J]. IEEE Communications Letters, 2009, 13(3): 170 -171.
  • 10Wei Yong-zhuang and Qiu Hong-bing, et al.. Security analysis of authentication scheme with anonymity for wireless environments [C]. International Conference on Communication Technology, Guilin, China, 2006: 1-4.

共引文献306

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部