Wireless security

Results: 2930



#Item
121Mobile telecommunications / Wireless / E-commerce / Near field communication / Samsung Pay / Oberthur Technologies / Samsung Galaxy / Samsung Electronics / Samsung / Computer security

Samsung Galaxy S7 embarks OT’s latest generation eSE Colombes, France, June 28, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products, services and solutions today announced

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-06-28 03:22:06
122Computer memory / Alarms / Security alarm / Content-addressable memory

COMMERCIAL GRADE Napco Commercial Addressable Burglary Systems Flexible for All Budgets & Applications Addressable • Conventional • Commercial Wireless System supports up to 96 addressable points

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2014-06-10 12:37:38
123Computer access control / Wireless networking / Password / Security / Login / Wireless security / Wireless@SG

Wireless Accessing ConnSCU Internet Wireless from Macs (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:04:55
124Cryptographic protocols / Computer network security / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / 11i / Broadband

I N T U I C O M BroadBand Solutions 2.4GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:26
125Wireless networking / Bluetooth / Wireless / Computer network security / Computer network / Computer security / Microsoft Kin / Wi-Fi / Bluesnarfing

LoKI: Location-based PKI for Social Networks Randy Baden University of Maryland http://www.cs.umd.edu/~randofu/loki

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:40
126Mobile telecommunications / Wireless / Radio-frequency identification / Near Field Communications / Automatic identification and data capture / Near field communication / TecTile / Internet of things / Mobile RFID / Security token / Mobile phone / QR code

Smartphones Editor: Roy Want n Google n Near Field Communication Roy Want

Add to Reading List

Source URL: www.roywant.com

Language: English - Date: 2016-03-05 20:07:31
127Computer network security / Wireless networking / IEEE 802.11 / Wi-Fi / Cryptographic protocols / Wi-Fi Protected Access / Router / Wired Equivalent Privacy / Wardriving / Pharming / Computer security / Wireless router

WiFi networks and malware epidemiology Hao Hua,b, Steven Myersb, Vittoria Colizzac, and Alessandro Vespignanib,c,1 aDepartment of Physics, Indiana University, 727 East Third Street, Bloomington, IN 47405; bSchool of Info

Add to Reading List

Source URL: www.epicx-lab.com

Language: English - Date: 2012-09-08 12:43:38
128Mobile telecommunications / Smart cards / E-commerce / Near field communication / Wireless / Subscriber identity module / Mobile payment / Mobile app / GlobalPlatform / Android / UICC configuration / Trusted execution environment

Open Mobile API for App Developers: Speeds Time to Market and Reduces Development Overhead while Ensuring Advanced Security for Sensitive Applications The emergence of smartphones and tablets

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-01-26 04:40:08
129Wireless networking / Computer network security / Protected Extensible Authentication Protocol / IEEE 802.1X / RADIUS / WiMAX / Lightweight Extensible Authentication Protocol / Extensible Authentication Protocol

Aradial RADIUS AAA Server Aradial RADIUS AAA Server Affordable, easy to deploy and operate. High performance, availability and reliability%).

Add to Reading List

Source URL: www.aradial.com

Language: English - Date: 2010-05-10 11:58:17
130Computer network security / Wireless networking / Local area networks / Wi-Fi / IEEE 802.11 / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Wireless security / Comparison of wireless LAN clients

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to conn

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
UPDATE