1.What are the key words relevant to the vulnerabilities in wireless mobile data exchange 2.which digital data do you use? Did you use sciencedirect, springer, or other databases? Please list it/them. 3.Make a list of information of the related articles you find. While listing, please follow the format of the references list of the article you read..