Mobile security

Results: 2765



#Item
81Medicine / Cardiac electrophysiology / Neuroprosthetics / Technology / Security / Wireless networking / Artificial cardiac pacemaker / Biomedical engineering / Cybernetics / Medical device / Ubiquitous computing / Privacy

MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H.

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:02
82Prevention / Password / Security / Login / Print job / Access control / Safety

Mobile Printing User Guide

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-08 02:39:18
83Computing / Software / Computer security / Antivirus software / Intel Security / Smartphones / Android / Mobile security / Ransomware / Mobile app / John McAfee

Report McAfee Labs Threats Report June 2016

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2016-06-13 16:14:00
84Computing / Internet protocols / Network architecture / World Wide Web / SPDY / HTTP/2 / QUIC / Multipath TCP / LTE / Transmission Control Protocol / Hypertext Transfer Protocol / Transport Layer Security

An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:47:09
85Computer access control / Computer security / Cryptography / Technology / Multi-factor authentication / Authentication / Smart card / Mobile phone / Truphone / Subscriber identity module / Electronic authentication / Security token

ConsentID_datasheet1.indd

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:55
86Computing / Software / Java platform / Cross-platform software / Java Card / Applet / Java / MIDlet / Sandbox / ActiveX / Java applet / Java virtual machine

Language-based security for mobile code with applications to smart cards Xavier Leroy INRIA Rocquencourt &

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2005-01-12 04:26:34
87Software / Computing / Economy / E-commerce / Webmail / Cross-platform software / Computer network security / Mobile banking / Mobile content / Outlook.com / Password / Gmail

QXP_Layout:22 AM Page 1 ONLINE SERVICE AGREEMENT

Add to Reading List

Source URL: www.adambank.com

Language: English
88Computing / Software / Computer architecture / Smartphones / Cloud clients / E-commerce / Mobile operating systems / Information appliances / Mobile security / Android / Mobile banking / Mobile app

When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments Jon Oberheide Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:00
89Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
90Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:54
UPDATE