Search

Your search keyword '"MOBILE communication system security"' showing total 418 results

Search Constraints

Start Over You searched for: Descriptor "MOBILE communication system security" Remove constraint Descriptor: "MOBILE communication system security"
418 results on '"MOBILE communication system security"'

Search Results

1. The geopolitical hijacking of open networking: the case of Open RAN.

2. Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.

4. Mobile Software for Enhancing Cyberculture.

5. Predictable Privacy-Preserving Mobile Crowd Sensing: A Tale of Two Roles.

6. On the Strength of Privacy Metrics for Vehicular Communication.

7. Secure mobile device structure for trust IoT.

8. A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.

9. Four Billion Little Brothers? Privacy, mobile phones, and ubiquitous data collection.

10. What your phone says about you.

11. Global dynamics of a network-based WSIS model for mobile malware propagation over complex networks.

12. Wireless Network Security Based on the Image Address Masking (IAM) Mechanism.

13. A New Chaotic Map for Secure Transmission.

14. A heuristics approach to mine behavioural data logs in mobile malware detection system.

15. Modifying the structure KASUMI to improve its resistance towards attacks by inserting FSM and S-Box.

16. Cyber Security by a New Analogy: "The Allegory of the 'Mobile' Cave".

17. Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.

18. Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network.

19. Offline Mode for Corporate Mobile Client Security Architecture.

20. A Survey on Security in D2D Communications.

21. The design of secure mobile coupon mechanism with the implementation for NFC smartphones.

22. Security and Privacy for Cloud-Based IoT: Challenges.

23. An Architecture for Agile Systems Engineering of Secure Commercial Off-the-Shelf Mobile Communications.

24. A k-means clustering-based security framework for mobile data mining.

25. Keystroke dynamics on Android platform.

26. A mobile authentication system resists to shoulder-surfing attacks.

27. Secured measurement fusion scheme against deceptive ECM attack in radar network.

28. Securing mobile access with interactive image code and image key encryption.

29. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.

30. Joint Differentially Private Gale–Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.

31. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.

32. Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications.

33. Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.

34. Comprehension of cyber threats and their consequences in Slovenia.

35. An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.

36. Enforcing mobile security with location-aware role-based access control.

37. Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.

38. Cellular Network Fraud & Security, Jamming Attack and Defenses.

39. Mobile-Based DoS Attack Security Agent in Sensor Networking.

40. Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks.

41. Enabling seamless V2I communications: toward developing cooperative automotive applications in VANET systems.

42. Brave New World: Privacy Risks for Mobile Users.

45. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud.

46. Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications.

47. A static Android malicious code detection method based on multi-source fusion.

48. GBAAM: group-based access authentication for MTC in LTE networks.

49. Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.

50. SafeCandy: System for security, analysis and validation in Android.

Catalog

Books, media, physical & digital resources