Search Result "Mobile Security."
Information Security and Threats in Mobile Appliances
Journal: Recent Patents on Computer Science
Volume: 7 Issue: 1 Year: 2014 Page: 3-11
Author(s): Antonio Tedeschi,Angelo Liguori,Francesco Benedetto
Security: Does Mobile Application Protect Against Unwanted Usage?
Ebook: Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features
Volume: 1 Year: 2021
Author(s): Naveen Safia,Hafedh Al-Shihi,Mohamed Sarrab
Doi: 10.2174/9789814998246121010008
Mobile 3D Secure Transmission Based on Anonymous Buyer-Seller Watermarking Protocol
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 3 Issue: 1 Year: 2014 Page: 33-43
Author(s): Suk-Hwan Lee,Seong-Geun Kwon,Ki-Ryong Kwon
A Secure and Energy-Aware Routing Protocol for Optimal Routing in Mobile Wireless Sensor Networks (MWSNs)
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 9 Issue: 4 Year: 2019 Page: 507-520
Author(s): Olakanmi Oladayo,Abbas Ashraf
Secure Electronic Voting System based on Mobile-app and Blockchain
Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2992-3002
Author(s): Surbhi Dewan,Latika Singh,Neha Gupta
Mobile Cloud Computing
Ebook: Introduction to Sensors in IoT and Cloud Computing Applications
Volume: 1 Year: 2021
Author(s): Ambika Nagaraj
Doi: 10.2174/9789811479359121010007
ASMA: An Advanced Secure Messaging Application
Journal: Recent Advances in Computer Science and Communications
Volume: 15 Issue: 5 Year: 2022 Page: 786-793
Author(s): Arun Sharma
Mobile and Cloud Technology Applications in Picture Archiving and Communication System
Ebook: Recent Advances in Imaging
Volume: 1 Year: 2018
Author(s): Fuk-hay Tang
Doi: 10.2174/9781681087177118010003
A Secure Cluster Formation Protocol for Safe Consensus in Hierarchical Mobile Ad Hoc Networks
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 5 Issue: 1 Year: 2015 Page: 19-31
Author(s): Bharti Sharma,Ravinder S. Bhatia,Awadhesh K. Singh
Design A Resilient Network Infrastructure Security Policy Framework
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010004