Abstract

This article in view of the user's location information security sharing scheme analyzes the core technology and common sharing model, combined with the user's location information security core sharing scheme, including initialization processing, recording, location sharing, system security, etc., and its aim is to increase the use value of the sharing scheme, fully protect the user's information security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call