共 50 条
- [21] Labyrinth: Visually Configurable Data-leakage Detection in Mobile Applications 2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 1, 2015, : 279 - 286
- [22] PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 34 - 44
- [23] The Platform of Enterprise Third-Party Data Service Based on Distributed Mobile Communication ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 213 - +
- [24] Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 201 - 222
- [25] Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States International Journal of Theoretical Physics, 2016, 55 : 2969 - 2976
- [28] Resource Allocation for Mobile Data Offloading Through Third-Party Cognitive Small Cells COMMUNICATIONS AND NETWORKING, CHINACOM 2018, 2019, 262 : 438 - 447
- [29] A public key encryption authentication new protocol by using the third party for mobile communication ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1064 - 1069
- [30] Passive Geolocation of Mobile Subscribers Using a Single Base Station with Third Party Capture 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,