【文章內(nèi)容簡介】
該技術消耗的能量很低,在可以接受的范圍之內(nèi),這也為該技術的可行性研究提供了良好的基礎。讀過該論文后,使我不僅了解了手機驗證領域的一些知識,而且也學習到了一篇經(jīng)典論文的脈絡結構應該如何組織。這兩篇論文的結構嚴謹,層次分明,采用了遞進式的分析結構,邏輯性強,文筆流暢,表達清晰,重點突出。文章格式相當?shù)姆蠈W術規(guī)范,反映了作者很強的科研能力。另外,通過讀這篇論文,也使我認識和體會到了以下幾點:一切事物的發(fā)展都是循序漸進的,手機行業(yè)發(fā)展到今天已經(jīng)相當?shù)妮x煌。但是伴隨著事物的發(fā)展也會相應的提出一系列新的問題,我們要在遵循客觀規(guī)律的基礎上突出人的主觀能動性,而不要想著一蹴而就??蒲械牡缆肥乔鄣模巴臼枪饷鞯?。任何技術都有其優(yōu)點和缺點。在論文中提到了很多新興的手機驗證技術,這些技術都各有所長,但卻都不是完美的。我們只有正視這些缺點,取長補短,才能促進手機驗證領域的更好更快發(fā)展。手機驗證行業(yè)的價值。手機產(chǎn)業(yè)的高速發(fā)展,帶來了驗證技術的空前繁榮,但危害手機安全性的事件也在不斷發(fā)送,手機安全驗證的形勢是嚴峻的。我們應該從人的角度出發(fā),以人為本,只有如此才能設計出更好的產(chǎn)品供用戶使用。總之,正如一句名言所說:讀一本好書就像和一個高尚的人說話。我相信站在巨人的肩膀上才能有更高的成就,我以后要多讀書,讀好書,不斷提高科研水平和自身修養(yǎng),盡量為中國的科研事業(yè)做出自己力所能及的貢獻。The book I read the title of the paper is the progressive authentication: deciding when to authenticate on mobile phones “, this is a remended by the China Computer Federation International Academic Conference and journal papers, published in the USENIX paper prehensively discusses some new developments in the field of mobile phone authentication in recent years, and puts forward its own views and perspectives on the security and convenience of the current mobile phone authentication paper points out that the traditional verification methods are not in line with the needs of most mobile phone users, only a more intelligent means is the future development trend of the mobile phone viewpoint is bright, argument is clear and strong, argument is sufficient and reliable, data is accurate, detailed information, literature review rich and normative, which the party about cell phone safety verification has quite high new following brief introduction is as follows: First, security and availability In this paper, the current use of mobile phone population satisfaction conducted a detailed investigation and analysis, found that more than 60% of the mobile phone users will not use aspect of this phenomenon is that users feel that the verification method is too cumbersome, on the other hand also shows that users of their mobile phone security is the lack of correct paper referred to the ”Allornothing“ verification, namely all validation, or are not verified, this also is is most of the current mobile phone verification method and the way it does not meet the people39。s demand on security and techniques mentioned in this article for the mobile phone industry and not a new verification method, but a prehensive analysis of all current methods of verification of a conclusion: when the validation and on which application for is the significance of this paper, I