透過您的圖書館登入
IP:18.118.2.15
  • 期刊

A Review of Mobile Security Technologies: Current Technologies, Loopholes, associated Risks and Countermeasures

摘要


由於行動科技在近數年間進步神速及日新月異,行動商貿的普及性已有驚人的進展。可惜的是無線通訊的本質是很容易被干擾及侵犯,從而明顯地惡化了行動商貿的保安問題。此學術論文對現存之行動保安技術作了一個很全面的批判思考,當中包括有可能的保安漏洞及相關風險問題。最後,此論文提供一些實用的對策去應付以上日益嚴重的保安問題。

關鍵字

無資料

並列摘要


Mobile commerce has been booming rapidly partly due to advancement and sophistication of mobile technologies in recent years. Because o f the highly vulnerability nature existing in wireless data communication, this further exacerbates the security problems inherited from electronic commerce. This paper gives a critical review of most common mobile security technologies with respect to possible loopholes and associated risks. Finally, some countermeasures are derived from the discussion of the above issues.

參考文獻


Beck, Martin & Tews, Erik Tews. 2008, Practical attacks against WEP and WPA. DOI= http://dl.aircrack-ng. org/breakingwepandwpa.pdf
Berghel, Hal,Uecker, Jacob(2005).WiFi Attack Vectors.Communications of the ACM - Spyware.48(8),21-28.
Cisco ITP MAP Gateway for Public WLAN SIM Authentication and Authorization. Cisco White Paper
Dantu, Ram,Clothier, Gabriel,Atri, Anuj(2007).EAP methods for wireless networks.Computer Standards & Interfaces.29(3),289-301.
Gilbert David. 2012. How Secure is Your Smartphone? Google Android, iOS, BlackBerry and Microsoft Windows Phone Under Attack http://www.ibtimes.co.uk/articles/319581/20120326/safe-smartphone.htm

被引用紀錄


許光睿(2018)。基於多層次高效監督下降預測演算法的強健多模板追蹤設計〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2018.00811
謝佳潤(2011)。電子郵件稽核之研究〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2011.00255
吳柏青(2006)。國內溫泉旅館經營關鍵成功因素之探究〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2006.00850
Lee, C. F. (2006). 從專利文件自動產生擷取領域相關之正規表示法 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2006.00325
梁睿昌(2014)。基於多尺度熵分析法之生物啟發式結構健康診斷系統〔碩士論文,國立交通大學〕。華藝線上圖書館。https://doi.org/10.6842/NCTU.2014.01004

延伸閱讀