[7] |
QUAN Q F , TANG J , WEN H . Android mobile intelligent terminal operating system security mechanism security assessment[J]. Information Security and Technology, 2013,4(8): 54-58.
|
[8] |
张举 . WPKI 在移动电子商务中的应用研究[J]. 现代信息科技, 2017,1(4): 99-100.
|
|
ZHANG J . WPKI applied research in mobile electronic commerce[J]. Modern Information Technology, 2017,1(4): 99-100.
|
[9] |
明海波 . 移动商务安全工作模式中 WPKI 技术的应用[J]. 电脑知识与技术, 2016,12(35): 43-45.
|
|
MING H B . Application of WPKI technology in mobile commerce security work mode[J]. Computer Knowledge and Technology, 2016,12(35): 43-45.
|
[10] |
徐晓宁 . WPKI关键技术的设计与实现[D]. 西安:西安电子科技大学, 2015.
|
|
XU X N . Design and implementation of the key technology of WPKI[D]. Xi’an:Xidian University, 2015.
|
[11] |
伊恩泽, 佟新, 魏震 ,等. Android智能终端二维码安全检测系统的设计与实现[J]. 电脑知识与技术, 2017,13(8): 61-64.
|
|
YI E Z , TONG X , WEI Z ,et al. Design and implementation of Android intelligent terminal QR code security detection system[J]. Computer Knowledge and Technology, 2017,13(8): 61-64.
|
[12] |
梁栋 . Java加密与解密的艺术[M]. 北京: 机械工业出版社, 2014.
|
[1] |
王飞, 贾玉文 . 二维码在移动信息服务中的应用探析[J]. 学理论, 2013(35): 72-73.
|
|
WANG F , JIA Y W . Application of two-dimensional code in mobile in formation service[J]. Theory, 2013(35): 72-73.
|
[2] |
杨森 . 二维码应用及安全分析[J]. 信息安全与技术, 2015,6(8): 64-65.
|
|
YANG S . Application and security analysis of two dimensional code[J]. Information Security and Technology, 2015,6(8): 64-65.
|
[3] |
张丰, 施勇, 薛质 . 二维 QR 码在电子商务中应用的安全性研究[J]. 计算机技术与发展, 2017,27(3): 131-135.
|
|
ZHANG F , SHI Y , XUE Z . Research on the security of two-dimensional QR codes in electronic commerce[J]. Computer Technology and Development, 2017,27(3): 131-135.
|
[4] |
马文生 . 我国发布首个二维码安全规范应用评价体系[J]. 中国防伪报道, 2016(3): 45.
|
|
MA W S . Releases the first releases code safety standard application evaluation system in China[J]. China Anti-Counterfeiting Report, 2016(3): 45.
|
[5] |
蒋溢, 刘雨龙, 罗宇豪 . 基于混沌 Z-映射的 QR 码加密机制[J]. 计算机工程与设计, 2016,37(9): 2361-2365.
|
|
JIANG Y , LIU Y L , L Y H . QR code encryption mechanism based on chaotic Z-map[J]. Computer Engineering and Design, 2016,37(9): 2361-2365.
|
[6] |
马峰, 张硕 . 一种基于信息隐藏的安全二维码技术[J]. 科学技术创新, 2017(32): 83-84.
|
|
MA F , ZHANG S . A secure two-dimensional code technology based on information hiding[J]. Science and Technology Innovation, 2017(32): 83-84.
|
[7] |
逯全芳, 唐杰, 文红 . Android移动智能终端操作系统安全机制的安全性评估[J]. 信息安全与技术, 2013,4(8): 54-58.
|
[12] |
LIANG D . Java encryption and decryption art[M]. Beijing: Mechanical Industry Press, 2014.
|