Search Result "Mobile Security."


Information Security and Threats in Mobile Appliances

Journal: Recent Patents on Computer Science
Volume: 7 Issue: 1 Year: 2014 Page: 3-11
Author(s): Antonio Tedeschi,Angelo Liguori,Francesco Benedetto

Security: Does Mobile Application Protect Against Unwanted Usage?

Ebook: Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features
Volume: 1 Year: 2021
Author(s): Naveen Safia,Hafedh Al-Shihi,Mohamed Sarrab
Doi: 10.2174/9789814998246121010008

Mobile 3D Secure Transmission Based on Anonymous Buyer-Seller Watermarking Protocol

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 3 Issue: 1 Year: 2014 Page: 33-43
Author(s): Suk-Hwan Lee,Seong-Geun Kwon,Ki-Ryong Kwon

Research Article

A Secure and Energy-Aware Routing Protocol for Optimal Routing in Mobile Wireless Sensor Networks (MWSNs)

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 9 Issue: 4 Year: 2019 Page: 507-520
Author(s): Olakanmi Oladayo,Abbas Ashraf

Research Article

Secure Electronic Voting System based on Mobile-app and Blockchain

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2992-3002
Author(s): Surbhi Dewan,Latika Singh,Neha Gupta

Mobile Cloud Computing

Ebook: Introduction to Sensors in IoT and Cloud Computing Applications
Volume: 1 Year: 2021
Author(s): Ambika Nagaraj
Doi: 10.2174/9789811479359121010007

General Research Article

ASMA: An Advanced Secure Messaging Application

Journal: Recent Advances in Computer Science and Communications
Volume: 15 Issue: 5 Year: 2022 Page: 786-793
Author(s): Arun Sharma

Mobile and Cloud Technology Applications in Picture Archiving and Communication System

Ebook: Recent Advances in Imaging
Volume: 1 Year: 2018
Author(s): Fuk-hay Tang
Doi: 10.2174/9781681087177118010003

A Secure Cluster Formation Protocol for Safe Consensus in Hierarchical Mobile Ad Hoc Networks

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 5 Issue: 1 Year: 2015 Page: 19-31
Author(s): Bharti Sharma,Ravinder S. Bhatia,Awadhesh K. Singh

Design A Resilient Network Infrastructure Security Policy Framework

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010004

Previous   Next

Go To   Results 1 - 1 of 1312

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy