Wireless security

Results: 2930



#Item
51Technology / Wireless networking / Electronics / Electronic countermeasures / Telecommunications engineering / Denial-of-service attacks / Computer network security / IEEE 802.11 / Electronic counter-countermeasure / Radio jamming / Wireless security / Wireless ad hoc network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-27 11:39:29
52Computing / Technology / American brands / Videotelephony / Computer network security / Cisco Systems / Deep packet inspection / Wireless networking / Virtual private network / Wi-Fi / Bring your own device / Cisco Prime

Five Critical Considerations for Network Access Deploy and Manage Your LAN and Mobile Devices with Cisco ONE™ for Access

Add to Reading List

Source URL: webobjects.cdw.com

Language: English - Date: 2016-04-06 10:58:57
53Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
54Wireless networking / Wireless / Synthetic aperture radar / Sensors / Technology / Computing / Computer networking / Sensor node / Wireless sensor network / Unattended ground sensor / Security alarm

iScout® i S co u t ® D E S I G N iScout® sensors were designed to produce exceptional performance while keeping size and cost

Add to Reading List

Source URL: www.mcqinc.com

Language: English - Date: 2015-11-23 09:29:36
55Safety / Prevention / Medicine / Identity documents / Health informatics / Computer network security / Bracelets / Fashion / Wristband / Medical identification tag / Medical alarm / Artificial cardiac pacemaker

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices Tamara Denning† , Alan Borning† , Batya Friedman‡ , Brian T. Gill∗ , Tadayoshi Kohno† , a

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:00
56Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
57Computing / Wireless / Bluetooth / Humancomputer interaction / Bluesnarfing / Computer security / Kali Linux / Fitbit / Wearable technology / Kismet / Security token / Java APIs for Bluetooth

Security of Bluetooth Network Data Traffic Michael Grant Williams DoD Contractor Iowa State University

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2016-06-13 23:23:06
58Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
59Wireless sensor network / Cameras / Cinematography / Filmmaking / Technology / Computing / Pantiltzoom camera / Security engineering / Video / Sensor node / Visual sensor network / Video camera

MultiSense: Fine-grained Multiplexing for Steerable Camera Sensor Networks Navin K. Sharma, David E. Irwin, Prashant J. Shenoy and Michael Zink University of Massachusetts Amherst {nksharma,irwin,shenoy}@cs.umass.edu, zi

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2014-08-13 10:33:24
60Technology / Mobile technology / Wireless / Mobile device management / Mobile phones / Mobile app / Bring your own device / Enterprise mobility management / Business process management / Mobile security / Application software / Mobile business intelligence

CITO Research CITO Research 2015 Executive

Add to Reading List

Source URL: techorchard.com

Language: English - Date: 2015-08-13 13:38:08
UPDATE