Works matching DE "MOBILE communication system security"
Results: 79
Wireless Network Security Based on the Image Address Masking (IAM) Mechanism.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 23, doi. 10.1007/s11277-018-5664-y
- By:
- Publication type:
- Article
Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 859, doi. 10.1007/s11277-017-4541-4
- By:
- Publication type:
- Article
Mobile-Based DoS Attack Security Agent in Sensor Networking.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 91, doi. 10.1007/s11277-015-3098-3
- By:
- Publication type:
- Article
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 1, p. 207, doi. 10.1007/s11277-015-2604-y
- By:
- Publication type:
- Article
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1975, doi. 10.1007/s11277-014-1968-8
- By:
- Publication type:
- Article
On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2649, doi. 10.1007/s11277-014-1659-5
- By:
- Publication type:
- Article
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 1, p. 69, doi. 10.1007/s11277-010-0001-0
- By:
- Publication type:
- Article
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks.
- Published in:
- Wireless Personal Communications, 2009, v. 48, n. 4, p. 569, doi. 10.1007/s11277-008-9548-4
- By:
- Publication type:
- Article
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices.
- Published in:
- Wireless Personal Communications, 2007, v. 42, n. 2, p. 213, doi. 10.1007/s11277-006-9174-y
- By:
- Publication type:
- Article
Security and Privacy in Wireless and Mobile Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 2, p. 18, doi. 10.3390/fi10020018
- By:
- Publication type:
- Article
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- By:
- Publication type:
- Article
OWL ONTOLOGY REPRESENTATION UNDER A SECURE MOBILE CONTEXT.
- Published in:
- Journal of Information Systems & Operations Management, 2011, v. 5, n. 2, p. 220
- By:
- Publication type:
- Article
Offline Mode for Corporate Mobile Client Security Architecture.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 4, p. 743, doi. 10.1007/s11036-017-0839-4
- By:
- Publication type:
- Article
A Survey on Security in D2D Communications.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 2, p. 195, doi. 10.1007/s11036-016-0741-5
- By:
- Publication type:
- Article
Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks.
- Published in:
- Mobile Networks & Applications, 2015, v. 20, n. 6, p. 840, doi. 10.1007/s11036-015-0619-y
- By:
- Publication type:
- Article
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 64, doi. 10.1007/s11036-013-0462-y
- By:
- Publication type:
- Article
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
MobiSens: A Versatile Mobile Sensing Platform for Real-World Applications.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 1, p. 60, doi. 10.1007/s11036-012-0422-y
- By:
- Publication type:
- Article
A Privacy-Considerate Framework for Identity Management in Mobile Services.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 446, doi. 10.1007/s11036-011-0325-3
- By:
- Publication type:
- Article
On Address Privacy in Mobile Ad Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 2, p. 188, doi. 10.1007/s11036-008-0142-5
- By:
- Publication type:
- Article
Multi-party encryption (MPE): secure communications in delay tolerant networks.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 4, p. 1243, doi. 10.1007/s11276-014-0848-1
- By:
- Publication type:
- Article
Edge Computing Security of Mobile Communication System Based on Computer Algorithms.
- Published in:
- International Journal of Cooperative Information Systems, 2025, v. 34, n. 1, p. 1, doi. 10.1142/S0218843024500023
- By:
- Publication type:
- Article
Mobile Security Issues Come to the Forefront.
- Published in:
- IEEE Internet Computing, 2012, v. 16, n. 3, p. 7, doi. 10.1109/MIC.2012.54
- By:
- Publication type:
- Article
SafeCandy: System for security, analysis and validation in Android.
- Published in:
- Sistemas & Telemática, 2015, v. 13, n. 35, p. 89, doi. 10.18046/syt.v13i35.2154
- By:
- Publication type:
- Article
The Need to Address Mobile Device Security in the Higher Education IT Curriculum.
- Published in:
- Journal of Information Systems Education, 2013, v. 24, n. 1, p. 41
- By:
- Publication type:
- Article
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
- Published in:
- Telecommunication Systems, 2018, v. 69, n. 4, p. 431, doi. 10.1007/s11235-018-0446-0
- By:
- Publication type:
- Article
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 3, p. 1273, doi. 10.3837/tiis.2016.03.018
- By:
- Publication type:
- Article
Advanced Information Security Management Evaluation System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 6, p. 1192, doi. 10.3837/tiis.2011.06.006
- By:
- Publication type:
- Article
Robustness of Face Recognition to Variations of Illumination on Mobile Devices Based on SVM.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 1, p. 25, doi. 10.3837/tiis.2010.01.002
- By:
- Publication type:
- Article
A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 6, p. 297, doi. 10.1080/19393555.2012.738374
- By:
- Publication type:
- Article
Cyber Security by a New Analogy: "The Allegory of the 'Mobile' Cave".
- Published in:
- Journal of Applied Security Research, 2018, v. 13, n. 1, p. 63, doi. 10.1080/19361610.2018.1387838
- By:
- Publication type:
- Article
Patrol Detection for Replica Attacks on Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2011, v. 11, n. 3, p. 2496, doi. 10.3390/s110302496
- By:
- Publication type:
- Article
An Architecture for Agile Systems Engineering of Secure Commercial Off-the-Shelf Mobile Communications.
- Published in:
- Systems Engineering, 2017, v. 20, n. 1, p. 71, doi. 10.1002/sys.21379
- By:
- Publication type:
- Article
Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2016, v. 27, n. 9, p. 1233, doi. 10.1002/ett.3072
- By:
- Publication type:
- Article
Rogue Smartphones.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 2, p. 6
- By:
- Publication type:
- Article
From the PRESIDENT.
- Published in:
- Georgia Library Quarterly, 2011, v. 48, n. 4, p. 3, doi. 10.62915/2157-0396.1567
- Publication type:
- Article
Detecting age groups using touch interaction based on neuromotor characteristics.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 20, p. 1349, doi. 10.1049/el.2017.0492
- By:
- Publication type:
- Article
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 612, doi. 10.1007/s12083-013-0220-8
- By:
- Publication type:
- Article
Fault-Tolerant Control of the Road Wheel Subsystem in a Steer-By-Wire System.
- Published in:
- International Journal of Vehicular Technology, 2008, v. 2008, p. 1
- By:
- Publication type:
- Article
Securing VoIP in SIP Mobile Network.
- Published in:
- World of Computer Science & Information Technology Journal, 2015, v. 5, n. 1, p. 6
- By:
- Publication type:
- Article
Mobile Application Threats and Security.
- Published in:
- World of Computer Science & Information Technology Journal, 2014, v. 4, n. 5, p. 57
- By:
- Publication type:
- Article
RULE-BASED MONITORS AND POLICY INVARIANTS FOR GUARANTEEING MOBILE CODE SECURITY.
- Published in:
- International Journal on Information Technologies & Security, 2015, v. 7, n. 2, p. 17
- By:
- Publication type:
- Article
Vulnerabilities and Attacks in Global System for Mobile Communication (GSM).
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 139
- By:
- Publication type:
- Article
A Secure NFC-Based Mobile Printing Service Using Recognition Robot.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/564506
- By:
- Publication type:
- Article
Node Replication Attacks in Mobile Wireless Sensor Network: A Survey.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/402541
- By:
- Publication type:
- Article
A NEW FINGERPRINT BIOMETRIC REMOTE USER AUTHENTICATION SCHEME USING CHAOTIC HASH FUNCTION ON MOBILE DEVICES.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 3, p. 471, doi. 10.1080/10798587.2010.10643094
- By:
- Publication type:
- Article
Broadcast Security in Future Mobile Networks.
- Published in:
- Electronics & Electrical Engineering, 2014, v. 20, n. 10, p. 69, doi. 10.5755/j01.eee.20.10.6392
- By:
- Publication type:
- Article
Packet Key-Based End-to-End Security Management on a Blockchain Control Plane.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 10, p. 2310, doi. 10.3390/s19102310
- By:
- Publication type:
- Article
One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 10, p. 1694, doi. 10.3390/s16101694
- By:
- Publication type:
- Article
Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?
- Published in:
- Journal of Medical Internet Research, 2015, v. 17, n. 11, p. 1, doi. 10.2196/medinform.4797
- By:
- Publication type:
- Article