Mobile security

Results: 2765



#Item
11Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi  Fraunhofer Institut f¨ur Graphische Datenverarbeitung

Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi Fraunhofer Institut f¨ur Graphische Datenverarbeitung

Add to Reading List

Source URL: www.volkerroth.com

Language: English - Date: 2007-11-23 00:00:04
    12Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Add to Reading List

    Source URL: www.volkerroth.com

    Language: English - Date: 2007-11-23 00:00:49
      1312th Int.l Summer school for advanced studies on biometrics: Biometrics for Forensic, Security and Mobile Applications JuneCOURSE SCHEDULE 9:00 - 9:15

      12th Int.l Summer school for advanced studies on biometrics: Biometrics for Forensic, Security and Mobile Applications JuneCOURSE SCHEDULE 9:00 - 9:15

      Add to Reading List

      Source URL: biometrics.uniss.it

      Language: English - Date: 2015-06-18 16:54:27
        14A Mobile Application for Your School or District To Conduct a Site Assessment This comprehensive tool allows school and district personnel to walk around a school building and grounds and examine their safety, security,

        A Mobile Application for Your School or District To Conduct a Site Assessment This comprehensive tool allows school and district personnel to walk around a school building and grounds and examine their safety, security,

        Add to Reading List

        Source URL: rems.ed.gov

        Language: English - Date: 2017-11-08 10:29:44
          15Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations Peter Aufner, Georg Merzdovnik, Markus Huber and Edgar Weippl SBA Research Sommerpalais Harrach, Favoritenstrasse 16, 2. Stock, AT-104

          Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations Peter Aufner, Georg Merzdovnik, Markus Huber and Edgar Weippl SBA Research Sommerpalais Harrach, Favoritenstrasse 16, 2. Stock, AT-104

          Add to Reading List

          Source URL: www.sba-research.org

          Language: English - Date: 2014-08-27 08:27:26
            16DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

            DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

            Add to Reading List

            Source URL: people.cs.vt.edu

            Language: English - Date: 2018-04-09 14:09:44
              172011 IEEE Symposium on Security and Privacy  Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices  Michael Becher, Felix C. Freiling

              2011 IEEE Symposium on Security and Privacy Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices Michael Becher, Felix C. Freiling

              Add to Reading List

              Source URL: oaklandsok.github.io

              Language: English - Date: 2018-03-14 15:33:55
                18BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna {n

                BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna {n

                Add to Reading List

                Source URL: www.s3.eurecom.fr

                Language: English - Date: 2017-11-07 11:46:31
                  19Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

                  Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

                  Add to Reading List

                  Source URL: goverifyid.com

                  Language: English - Date: 2016-11-11 20:31:23
                    20REQUEST	FOR	PROPOSAL To provide security mobile patrol services to industrial, commercial and retail members throughout the designated BIA area. Issued on:

                    REQUEST FOR PROPOSAL To provide security mobile patrol services to industrial, commercial and retail members throughout the designated BIA area. Issued on:

                    Add to Reading List

                    Source URL: emeryvillagebia.ca

                    Language: English - Date: 2018-08-01 14:28:24