您当前的位置:
首页 >
文章列表页 >
Research on security of third-party tracking
PaperⅠ Network attack and Prevention | 更新时间:2024-06-05
    • Research on security of third-party tracking

    • Journal on Communications   Vol. 35, Issue 9, Pages: 1-11(2014)
    • DOI:10.3969/j.issn.1000-436x.2014.09.001    

      CLC: TP393.08
    • Online First:2014-09

      Published:25 September 2014

    移动端阅览

  • Yu-qing ZHANG, Qian-ru WU, Qi-xu LIU, et al. Research on security of third-party tracking[J]. Journal on Communications, 2014, 35(9): 1-11. DOI: 10.3969/j.issn.1000-436x.2014.09.001.

  •  
  •  

0

Views

1982

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey on chaos-based low probability of interception communication technology
Survey on privacy protection indoor positioning
Survey of capacity limits and implementation techniques in wireless covert communication
Research on coreference resolution technology of entity in information security
Research on color QR code watermarking technology based on chaos theory

Related Author

ZHOU Ang
WANG Shilian
CHEN Weiyu
XIA Guojiang
Zhiheng WANG
Yanyan XU
Weiyu CHEN
Junshan LUO

Related Institution

Beijing Institute of Astronautical Systems Engineering
College of Electronic Science and Technology, National University of Defense Technology
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University
State Key Lab of Rail Traffic Control and Safety,Beijing Jiaotong University
College of Information and Communication, National University of Defense Technology
0