【文章內(nèi)容簡(jiǎn)介】
高的應(yīng)用來(lái)說(shuō),F(xiàn)A的比率一直為0,即絕不會(huì)出現(xiàn)非法用戶不經(jīng)過(guò)驗(yàn)證即使用這些應(yīng)用的情況;而FR的比率一直在96%以上,即對(duì)于一個(gè)合法用戶,隨著R的升高,被錯(cuò)誤的要求驗(yàn)證的概率并沒(méi)有明顯的降低。在論文最后,用實(shí)際的數(shù)據(jù)表明該技術(shù)消耗的能量很低,在可以接受的范圍之內(nèi),這也為該技術(shù)的可行性研究提供了良好的基礎(chǔ)。讀過(guò)該論文后,使我不僅了解了手機(jī)驗(yàn)證領(lǐng)域的一些知識(shí),而且也學(xué)習(xí)到了一篇經(jīng)典論文的脈絡(luò)結(jié)構(gòu)應(yīng)該如何組織。這兩篇論文的結(jié)構(gòu)嚴(yán)謹(jǐn),層次分明,采用了遞進(jìn)式的分析結(jié)構(gòu),邏輯性強(qiáng),文筆流暢,表達(dá)清晰,重點(diǎn)突出。文章格式相當(dāng)?shù)姆蠈W(xué)術(shù)規(guī)范,反映了作者很強(qiáng)的科研能力。另外,通過(guò)讀這篇論文,也使我認(rèn)識(shí)和體會(huì)到了以下幾點(diǎn):一切事物的發(fā)展都是循序漸進(jìn)的,手機(jī)行業(yè)發(fā)展到今天已經(jīng)相當(dāng)?shù)妮x煌。但是伴隨著事物的發(fā)展也會(huì)相應(yīng)的提出一系列新的問(wèn)題,我們要在遵循客觀規(guī)律的基礎(chǔ)上突出人的主觀能動(dòng)性,而不要想著一蹴而就??蒲械牡缆肥乔鄣?,但前途是光明的。任何技術(shù)都有其優(yōu)點(diǎn)和缺點(diǎn)。在論文中提到了很多新興的手機(jī)驗(yàn)證技術(shù),這些技術(shù)都各有所長(zhǎng),但卻都不是完美的。我們只有正視這些缺點(diǎn),取長(zhǎng)補(bǔ)短,才能促進(jìn)手機(jī)驗(yàn)證領(lǐng)域的更好更快發(fā)展。手機(jī)驗(yàn)證行業(yè)的價(jià)值。手機(jī)產(chǎn)業(yè)的高速發(fā)展,帶來(lái)了驗(yàn)證技術(shù)的空前繁榮,但危害手機(jī)安全性的事件也在不斷發(fā)送,手機(jī)安全驗(yàn)證的形勢(shì)是嚴(yán)峻的。我們應(yīng)該從人的角度出發(fā),以人為本,只有如此才能設(shè)計(jì)出更好的產(chǎn)品供用戶使用??傊?,正如一句名言所說(shuō):讀一本好書就像和一個(gè)高尚的人說(shuō)話。我相信站在巨人的肩膀上才能有更高的成就,我以后要多讀書,讀好書,不斷提高科研水平和自身修養(yǎng),盡量為中國(guó)的科研事業(yè)做出自己力所能及的貢獻(xiàn)。The book I read the title of the paper is the progressive authentication: deciding when to authenticate on mobile phones “, this is a remended by the China Computer Federation International Academic Conference and journal papers, published in the USENIX paper prehensively discusses some new developments in the field of mobile phone authentication in recent years, and puts forward its own views and perspectives on the security and convenience of the current mobile phone authentication paper points out that the traditional verification methods are not in line with the needs of most mobile phone users, only a more intelligent means is the future development trend of the mobile phone viewpoint is bright, argument is clear and strong, argument is sufficient and reliable, data is accurate, detailed information, literature review rich and normative, which the party about cell phone safety verification has quite high new following brief introduction is as follows: First, security and availability In this paper, the current use of mobile phone population satisfaction conducted a detailed investigation and analysis, found that more than 60% of the mobile phone users will not use aspect of this phenomenon is that users feel that the verification method is too cumbersome, on the other hand also shows that users of their mobile phone security is the lack of correct paper referred to the ”Allornothing“ verification, namely all validation, or are not verified, this also is is most of the current mobile phone verification method and the way it does not meet the people39。s demand on security and techniques mentioned in this article for the mobile phone industry and not a new verification method, but a prehensive analysis of all current methods of verification of a conclusion: when the val