-
1
-
-
84888502214
-
-
The GSM Association
-
The GSM Association, http://www.gsm.org.
-
-
-
-
2
-
-
84888538458
-
-
The GSM Association, Market Research
-
The GSM Association, Market Research, 2007, http://gsmworld.com/our-work/ programmesandinitiatives/mobile-money/market-research.htm.
-
(2007)
-
-
-
4
-
-
84888500059
-
-
D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003.
-
D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003.
-
-
-
-
6
-
-
84888504068
-
-
The WAP forum
-
The WAP forum, http://www.wapforum.org.
-
-
-
-
7
-
-
84888510214
-
-
™ 1.0 The Extensible HyperText Markup Language. http://www.w3.org/TR/xhtml1. S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330.
-
™ 1.0 The Extensible HyperText Markup Language. http://www.w3.org/TR/xhtml1. S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330.
-
-
-
-
8
-
-
84888524624
-
-
World Wide Web Consortium, http://www.w3c.org
-
-
-
-
9
-
-
25144484800
-
-
3rd edition, Prentice Hall
-
A. Tanenbaum, Réseaux, 3rd edition, Prentice Hall, 1997, pp. 271-273.
-
(1997)
Réseaux
, pp. 271-273
-
-
Tanenbaum, A.1
-
10
-
-
52049121858
-
-
S. Beji, N. El Kadhi, An Overview of Mobile Applications Architecture and the Associated Technologies, icwmc,pp.77-83, 2008 The Fourth International Conference on Wireless and Mobile Communications, 2008.
-
S. Beji, N. El Kadhi, "An Overview of Mobile Applications Architecture and the Associated Technologies", icwmc,pp.77-83, 2008 The Fourth International Conference on Wireless and Mobile Communications, 2008.
-
-
-
-
13
-
-
62749151685
-
-
Microsoft Press, Washington, USA, pp
-
T. Gallagher, B. Jeffries, and L. Landauer, Chasser les failles de sécurité, Microsoft Press, 2007, Washington, USA, pp. 20-21.
-
(2007)
Chasser les failles de sécurité
, pp. 20-21
-
-
Gallagher, T.1
Jeffries, B.2
Landauer, L.3
-
14
-
-
70349553734
-
A PK-SIM card based end-to-end security framework for SMS
-
June
-
H. Rongyu, Z. Guolei b, C. Chaowen, X. Hui, Q. Xi, Q. Zheng, "A PK-SIM card based end-to-end security framework for SMS", Computer Standards and Interfaces, June 2008.
-
(2008)
Computer Standards and Interfaces
-
-
Rongyu, H.1
Guolei b, Z.2
Chaowen, C.3
Hui, X.4
Xi, Q.5
Zheng, Q.6
-
16
-
-
33947123970
-
-
D. Geneiatakis, T. Dagiuklas1, C. Lambrinoudakis, G.Kambourakis and S. Gritzalis, Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51 , July 2007, pp. 2580-2593.
-
D. Geneiatakis, T. Dagiuklas1, C. Lambrinoudakis, G.Kambourakis and S. Gritzalis, "Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study", Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 51 , July 2007, pp. 2580-2593.
-
-
-
-
18
-
-
53849132491
-
Case Study on the Bluetooth Vulnerabilities in Mobile Devices
-
April
-
A. Solon, M. Callaghan, J. Harkin, and T. McGinnity, "Case Study on the Bluetooth Vulnerabilities in Mobile Devices". International Journal of Computer Science and Network Security, VOL.6 No.4, April 2006.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.4
-
-
Solon, A.1
Callaghan, M.2
Harkin, J.3
McGinnity, T.4
-
19
-
-
70349551543
-
Cross Site Scripting and phishing
-
Avril
-
T. Seyrat, "Cross Site Scripting and phishing", JIP Tunisia, Avril 2005.
-
(2005)
JIP Tunisia
-
-
Seyrat, T.1
-
21
-
-
0035267850
-
Agents and the Semantic Web
-
Hendler J., "Agents and the Semantic Web", IEEE Intelligent Systems, Vol 16 No 2, pp 30-37.
-
IEEE Intelligent Systems
, vol.16
, Issue.2
, pp. 30-37
-
-
Hendler, J.1
-
22
-
-
85001799494
-
An Ontology of Information Security
-
A. Herzog, N. Shahmehri, C. Duma, "An Ontology of Information Security", International Journal of Information Security and Privacy, Volume 1, Issue 4, 2007.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
23
-
-
33646699357
-
Security Ontology for Annotating Resources
-
Springer-Verlag Berlin Heidelberg
-
A. Kim, J. Luo, and Myong Kang, "Security Ontology for Annotating Resources", LNCS 3761, pp. 1483 - 1499. Springer-Verlag Berlin Heidelberg 2005.
-
(2005)
LNCS
, vol.3761
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
24
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
New Mexico, Pages
-
V. Raskin, C. F. Hempelmann, K. E. Triezenberg, S. Nirenburg, "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool", Proceedings of the 2001 workshop on New security paradigms, Cloudcroft, New Mexico, Pages: 53-59.
-
Proceedings of the 2001 workshop on New security paradigms, Cloudcroft
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg, S.4
-
25
-
-
34548166079
-
Towards an Ontology-based Organizational Risk Assessment in Collaborative Environments Using the SemanticLIFE
-
ARES
-
M. Ahmed, A. Anjomshoaa, T. M. Nguyen, and A Min Tjoa, "Towards an Ontology-based Organizational Risk Assessment in Collaborative Environments Using the SemanticLIFE", International Conference on Availability, Reliability and Security, ARES 2007.
-
(2007)
International Conference on Availability, Reliability and Security
-
-
Ahmed, M.1
Anjomshoaa, A.2
Nguyen, T.M.3
Min Tjoa, A.4
-
26
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
J. Mylopoulos, L. Chung, and B. A. Nixon. "Representing and using nonfunctional requirements: A process-oriented approach" IEEE Transactions on Software Engineering, 18, 1992, pp.483-497.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.A.3
-
27
-
-
84888498893
-
-
Specification of the Resource Description Framework RDF
-
Specification of the Resource Description Framework (RDF), http://www.w3.org/RDF.
-
-
-
-
28
-
-
84888496911
-
-
OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide- 20040210. S. Lauesen, H. Younessi, Six Styles for Usability Requirements, Proceedings of REFSQ'98, Presses Universitaires de Namur, 1988.
-
OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide- 20040210. S. Lauesen, H. Younessi, "Six Styles for Usability Requirements", Proceedings of REFSQ'98, Presses Universitaires de Namur, 1988.
-
-
-
-
29
-
-
84888556452
-
-
Connolly D., Harmelen .F, Horrocks I., McGuinness D.,Patel-Schneider, P. A. Stein, 'DAML+OIL Reference Description, W3C Note'.
-
Connolly D., Harmelen .F, Horrocks I., McGuinness D.,Patel-Schneider, P. A. Stein, 'DAML+OIL Reference Description, W3C Note'.
-
-
-
-
30
-
-
84888525949
-
-
The OWL protege web
-
The OWL protege web page, http://protege.stanford.edu/overview/protege- owl.html.
-
-
-
-
32
-
-
0003767375
-
Information Processing Systems-Open System Interconnection-Basic Reference Model - Part 2: Security Architecture,
-
ISO 7498-2
-
ISO 7498-2: Information Processing Systems-Open System Interconnection-Basic Reference Model - Part 2: Security Architecture, 1989.
-
(1989)
-
-
|