共 12 条
- [1] Atat R., Liu L., Chen H., Et al., Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security, IET Cyber Physical Systems Theory & Applications, 2, 1, pp. 49-54, (2017)
- [2] He P., Personal information security crisis and legal protection countermeasures under e-commerce environment, Hebei Law Science, 8, pp. 34-41, (2014)
- [3] Li L., Li J., Proportionality principle: Ethical principle of privacy protection in electronic commerce, Studies in Ethics, 5, pp. 85-88, (2014)
- [4] Liao R.F., Wen H., Wu J., Et al., Security enhancement for mobile edge computing through physical layer authentication, IEEE Access, 7, 1, pp. 116390-116401, (2019)
- [5] Mi T., Research on privacy data protection in China's electronic commerce, Academic Exchange, 7, pp. 38-41, (2013)
- [6] Net H., Put an End to Privacy Leaks and the Courier Bill Will No Longer Show the Name of the Phone, (2017)
- [7] Nie L., The innovative and standardized development of e-commerce in China, China Business and Market, 6, pp. 52-57, (2016)
- [8] Wang X., Zhang N., Information security and information protection in the era of mobile electronic commerce, Lanzhou Academic Journal, 12, pp. 175-180, (2014)
- [9] Wu J., Guo S., Huang H., Et al., Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives, IEEE Communications Surveys & Tutorials, 20, 3, pp. 2389-2406, (2018)
- [10] Yang X., Research on Credit and Trust Mechanism in Electronic Business Environment, (2016)