This paper decribes the security architecture of WAP and some important properties of the WTLS protocol and proposes some countermeasures and good practices ...
確定! 回上一頁