메뉴 건너뛰기




Volumn 37, Issue , 2004, Pages 4589-4596

MIDP 2.0 security enhancements

Author keywords

J2ME; MIDP; Security

Indexed keywords

CONNECTED DEVICE CONFIGURATION (CDC); JAVA 2 MICRO EDITION (J2ME); MOBILE DEVICES; MOBILE INFORMATION DEVICE PROFILE (MIDP);

EID: 12344253674     PISSN: 10603425     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 9
    • 62749153744 scopus 로고    scopus 로고
    • [Online]
    • M. J. Yuan and J. Long, "Securing wireless J2ME," 2002. [Online]. Available: http://www-106.ibm.com/developerworks/wireless/library/ wisecj2me.html
    • (2002) Securing Wireless J2ME
    • Yuan, M.J.1    Long, J.2
  • 14
    • 84860087183 scopus 로고    scopus 로고
    • [Online]
    • L. Tarkkala, "Attacks against A5," 2000. [Online]. Available: http://www.hut.fi/u/ltarkkal/netsec.ps
    • (2000) Attacks Against A5
    • Tarkkala, L.1
  • 16
    • 0008942383 scopus 로고    scopus 로고
    • USA: John Wiley & Sons
    • _, Security Engineering. USA: John Wiley & Sons, 2001.
    • (2001) Security Engineering
  • 19
    • 0002544658 scopus 로고    scopus 로고
    • Software security and privacy risks in mobile e-commerce
    • 2
    • A. K. Ghosh and T. M. Swaminatha, "Software Security and Privacy Risks in Mobile E-Commerce," Communications of the ACM, vol. 44, pp. 51-57, 2 2001.
    • (2001) Communications of the ACM , vol.44 , pp. 51-57
    • Ghosh, A.K.1    Swaminatha, T.M.2
  • 22
    • 84860080097 scopus 로고    scopus 로고
    • Java and web-executable object security
    • 11. [Online]
    • M. Shoffner and M. Hughes, "Java and web-executable object security," Dr.Dobb's Journal, 11 1996. [Online]. Available: http://www.ddj.com/documents/ddj9611d/
    • (1996) Dr.Dobb's Journal
    • Shoffner, M.1    Hughes, M.2
  • 26
    • 84885891483 scopus 로고    scopus 로고
    • [Online]
    • L. of Bouncy Castle, "Bouncy Castle Crypto API." [Online]. Available: http://www.bouncycastle.org
    • Bouncy Castle Crypto API
  • 27
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • 1
    • C. Ellison and B. Schneier, "Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure," Computer Security Journal, 1 2000.
    • (2000) Computer Security Journal
    • Ellison, C.1    Schneier, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.