Research of Mobile Phone Security Technology

被引:0
作者
Zhang, Haiyan [1 ]
机构
[1] BEIJING Inst TechnologyZhu Hai, Zhuhai Campus, Zhuhai 519085, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION AND COMPUTER TECHNOLOGY (ICFCCT 2012) | 2012年
关键词
Security; Mobile phone viruses; Loopholes; Communication encryption; MULTIPLE;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the popularity of smart phones, mobile phone functions will become increasingly rich, mobile phone platform will be more and more open, the mobile phone security issues become increasingly prominent. This paper describes the characteristics of the mobile security, discusses in detail the security issues of mobile terminal, and proposes the mobile phone security strategy with reality.
引用
收藏
页码:111 / 115
页数:5
相关论文
共 10 条
[1]  
CHEN Jian-min, 2006, NETINFO SECURITY, V11, P52
[2]  
Dagon D, 2004, P IEEE PERV COMP, P11
[3]  
GUI Jia-ping, 2010, COMPUTER TECHNOLOGY, V1, P163
[4]   Coordinating a three-level supply chain with multiple suppliers, a vendor and multiple buyers [J].
Jaber, M. Y. ;
Goyal, S. K. .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2008, 116 (01) :95-103
[5]   Joint economic procurement - production-delivery policy for multiple items in a single-manufacturer, multiple-retailer system [J].
Kim, Taebok ;
Hong, Yushin ;
Chang, Soo Young .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2006, 103 (01) :199-208
[6]  
KUANG Wen-bo, 2009, NEWS WRITING, V4, P41
[7]  
LI Qun-zu, 2011, COMPUTER SERCURITY, V6, P63
[8]  
MA Guo-qun, 2011, NETINFO SECURITY, V5, P84
[9]   Understanding the Spreading Patterns of Mobile Phone Viruses [J].
Wang, Pu ;
Gonzalez, Marta C. ;
Hidalgo, Cesar A. ;
Barabasi, Albert-Laszlo .
SCIENCE, 2009, 324 (5930) :1071-1076
[10]  
WU Jun-jun, 2010, COMPUTER ENG SCI, V1, P37