Mobile Security Deployment

Results: 15



#Item
1Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-31 14:34:10
2TM  Secure Application Deployment for Mobile Devices on a Global Scale Speaker: Stéphanie Motré GlobalPlatform Card Security Working Group

TM Secure Application Deployment for Mobile Devices on a Global Scale Speaker: Stéphanie Motré GlobalPlatform Card Security Working Group

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-09-12 12:00:18
    3On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets Loukas Lazos and Radha Poovendran Network Security Laboratory (NSL) University of Washington, Seattle, WA llazos,

    On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets Loukas Lazos and Radha Poovendran Network Security Laboratory (NSL) University of Washington, Seattle, WA llazos,

    Add to Reading List

    Source URL: www2.engr.arizona.edu

    Language: English - Date: 2007-10-10 03:10:24
    4Sencha Space Manage the lifecycle, deployment, and security of your enterprise HTML5 applications for any user on any device

    Sencha Space Manage the lifecycle, deployment, and security of your enterprise HTML5 applications for any user on any device

    Add to Reading List

    Source URL: cdn.sencha.com

    Language: English - Date: 2014-10-27 18:24:52
    5NIST SP[removed]: Guidelines for the Secure Deployment of IPv6 Sheila Frankel Computer Security Division

    NIST SP[removed]: Guidelines for the Secure Deployment of IPv6 Sheila Frankel Computer Security Division

    Add to Reading List

    Source URL: www.rmv6tf.org

    Language: English - Date: 2012-12-14 14:08:23
    6Recycle!PleasePrintRecycledPaper

    Recycle!PleasePrintRecycledPaper

    Add to Reading List

    Source URL: www.gao.gov

    Language: English - Date: 2009-12-10 16:00:38
    7Sencha Space Manage the lifecycle, deployment, and security of your enterprise HTML5 applications for any user on any device

    Sencha Space Manage the lifecycle, deployment, and security of your enterprise HTML5 applications for any user on any device

    Add to Reading List

    Source URL: cdn.sencha.io

    Language: English - Date: 2014-10-27 18:24:52
    8Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

    Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    9I am Lieutenant Colonel Andrew Wood. I am a member of the Utah National Guard with 24 years of service as a Special Forces soldier. I was mobilized for the 2002 Winter Olympics, Afghanistan from September of 2003 to May

    I am Lieutenant Colonel Andrew Wood. I am a member of the Utah National Guard with 24 years of service as a Special Forces soldier. I was mobilized for the 2002 Winter Olympics, Afghanistan from September of 2003 to May

    Add to Reading List

    Source URL: oversight.house.gov

    Language: English - Date: 2012-10-10 09:03:07
    10Mobile Detection Deployment Units

    Mobile Detection Deployment Units

    Add to Reading List

    Source URL: www.dhs.gov

    Language: English - Date: 2014-01-28 12:51:59