首页 > 电子期刊 > J > 计算机时代

基于Android系统的隐私保护技术综述

rmission model and enforcement with user-defined runtime constraints." Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM,2010:328-332[6] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacksand Defenses." USENIX Security Symposium,2011.[7] Dietz, Michael, et al. "QUIRE: Lightweight Provenance for SmartPhone Operating Syste
<<上一页  下一页>>

首页 > 电子期刊 > J > 计算机时代

广州市越秀区图书馆版权所有。
联系电话:020-87673002

本站访问人数: