Login / Signup
The Security Hole in WAP: An Analysis of the Network and Business Rationales Underlying a Failure.
Niels Christian Juul
Niels Jørgensen
Published in:
Int. J. Electron. Commer. (2003)
Keyphrases
</>
forensic analysis
business process
information systems
wireless sensor networks
business processes
information security
security policies
access control
network traffic
business models
security requirements
security mechanisms
cyber attacks
mobile internet