Works matching DE "CELL phone security measures"
Results: 42
Compelling Suspects to Unlock Their Phones: Recommendations for Prosecutors and Law Enforcement.
- Published in:
- Brigham Young University Law Review, 2021, v. 2021, n. 2, p. 601
- By:
- Publication type:
- Article
Guest Editors' Introduction.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2014, v. 24, n. 7, p. 981, doi. 10.1142/S0218194014020021
- By:
- Publication type:
- Article
TECH TIP.
- Published in:
- Journal of the Missouri Bar, 2022, v. 78, n. 3, p. 117
- Publication type:
- Article
EVALUATING EFFECTIVENESS OF MOBILE BROWSER SECURITY WARNINGS.
- Published in:
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1373
- By:
- Publication type:
- Article
Anonymity guarantees of the UMTS/LTE authentication and connection protocol.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 6, p. 513, doi. 10.1007/s10207-014-0231-3
- By:
- Publication type:
- Article
TESTING FRAMEWORK FOR MOBILE DEVICE FORENSICS TOOLS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 221
- By:
- Publication type:
- Article
EFFECTS OF THE FACTORY RESET ON MOBILE DEVICES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 205
- By:
- Publication type:
- Article
USING OF GSM LOCATOR IN SECURITY APPLICATIONS.
- Published in:
- Annals of DAAAM & Proceedings, 2015, v. 26, n. 1, p. 0075, doi. 10.2507/26th.daaam.proceedings.011
- By:
- Publication type:
- Article
Improving Security Using Cryptography Based on Smartphone User Locations.
- Published in:
- Journal of Education & Science, 2022, v. 31, n. 2, p. 94, doi. 10.33899/edusj.2022.133190.1222
- By:
- Publication type:
- Article
Protection of Privacy Regarding Cell Phone Location.
- Published in:
- Computer Law Review International, 2018, v. 19, n. 6, p. 178, doi. 10.9785/cri-2018-190604
- By:
- Publication type:
- Article
Addressing Security and Privacy Risks in Mobile Applications.
- Published in:
- IT Professional, 2012, v. 14, n. 5, p. 28, doi. 10.1109/MITP.2012.72
- By:
- Publication type:
- Article
ZOMG! TXT MSG Bug.
- Published in:
- IT Professional, 2009, v. 11, n. 1, p. 9
- Publication type:
- Article
Long-term location privacy protection for location-based services in mobile cloud computing.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 5, p. 1735, doi. 10.1007/s00500-015-1703-8
- By:
- Publication type:
- Article
Hybroid: A Novel Hybrid Android Malware Detection Framework.
- Published in:
- Erzincan University Journal of Science & Technology, 2021, v. 14, n. 1, p. 331, doi. 10.18185/erzifbed.806683
- By:
- Publication type:
- Article
Touchless Authentication System Using Visual Fingertip Trajectories.
- Published in:
- Electrica, 2020, v. 20, n. 2, p. 143, doi. 10.5152/electrica.2020.20030
- By:
- Publication type:
- Article
Game of Phones, Data Isn't Coming: Modern Mobile Operating System Encryption and Its Chilling Effect on Law Enforcement.
- Published in:
- George Washington Law Review, 2017, v. 85, n. 2, p. 566
- By:
- Publication type:
- Article
Malwarebytes Mobile Security.
- Published in:
- Journal of the California Dental Association, 2018, v. 46, n. 9, p. 598
- By:
- Publication type:
- Article
Design of Lock Based Authentication System for Android Smartphone user.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 6, p. 125
- By:
- Publication type:
- Article
MIXED REACTION.
- Published in:
- In These Times, 2015, v. 39, n. 5, p. 6
- Publication type:
- Article
Putting a Square Peg in a Round Hole: The Search-Incident-to-Arrest Exception and Cellular Phones.
- Published in:
- American Journal of Trial Advocacy, 2010, v. 34, n. 1, p. 165
- By:
- Publication type:
- Article
An Android Security Policy Enforcement Tool.
- Published in:
- International Journal of Electronics & Telecommunications, 2015, v. 61, n. 4, p. 311, doi. 10.1515/eletel-2015-0040
- By:
- Publication type:
- Article
GSM - SWOT, Security and Millennium Development in Africa: A Survey on the impact of ICT in Ondo State, Nigeria.
- Published in:
- International Journal of Cyber Criminology, 2009, v. 3, n. 2, p. 536
- By:
- Publication type:
- Article
SmartContent--Self-Protected Context-Aware Active Documents for Mobile Environments.
- Published in:
- Electronics (2079-9292), 2017, v. 6, n. 1, p. 17, doi. 10.3390/electronics6010017
- By:
- Publication type:
- Article
Malware Analysis on Mobile Phone.
- Published in:
- eLearning & Software for Education, 2018, v. 4, p. 11, doi. 10.12753/2066-026X-18-215
- By:
- Publication type:
- Article
A changeable personal identification number-based keystroke dynamics authentication system on smart phones.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2674, doi. 10.1002/sec.1265
- By:
- Publication type:
- Article
A privacy-preserving location tracking system for smartphones based on cloud storage.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 3, p. 446, doi. 10.1002/sec.992
- By:
- Publication type:
- Article
Biometric Security for Cell Phones.
- Published in:
- Informatica Economica, 2009, v. 13, n. 1, p. 57
- By:
- Publication type:
- Article
Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2493, doi. 10.1007/s11277-015-2716-4
- By:
- Publication type:
- Article
Apple v. FBI: Privacy vs. Security?
- Published in:
- National Social Science Journal, 2017, v. 48, n. 2, p. 9
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
- Published in:
- PLoS ONE, 2015, v. 10, n. 11, p. 1, doi. 10.1371/journal.pone.0142716
- By:
- Publication type:
- Article
Cybercriminals target user systems.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 20
- Publication type:
- Article
Cell Phones in the Workplace.
- Published in:
- Professional Safety, 2016, v. 61, n. 12, p. 30
- Publication type:
- Article
Mobile Apps, the FTC, and Reasonable Security Defined.
- Published in:
- ISSA Journal, 2016, v. 14, n. 3, p. 5
- By:
- Publication type:
- Article
GOVERNMENT PURCHASES OF PRIVATE DATA.
- Published in:
- Wake Forest Law Review, 2024, v. 59, n. 1, p. 269
- By:
- Publication type:
- Article
New Comprehensive Taxonomies on Mobile Security and Malware Analysis.
- Published in:
- International Journal of Information Security Science, 2016, v. 5, n. 4, p. 106
- By:
- Publication type:
- Article
A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting.
- Published in:
- International Journal of Information Security Science, 2016, v. 5, n. 4, p. 82
- By:
- Publication type:
- Article
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer.
- Published in:
- Journal of Information Processing Systems, 2013, v. 9, n. 2, p. 333, doi. 10.3745/JIPS.2013.9.2.333
- By:
- Publication type:
- Article
BLUETOOTH MITM VULNERABILITIES: A LITERATURE REVIEW, NOVEL ATTACK SCENARIOS, NOVEL COUNTERMEASURES, AND LESSONS LEARNED.
- Published in:
- International Journal on Information Technologies & Security, 2016, v. 8, n. 4, p. 25
- By:
- Publication type:
- Article
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/929380
- By:
- Publication type:
- Article
FACE ID AND FINGERPRINTS: MODERNIZING FIFTH AMENDMENT PROTECTIONS FOR CELL PHONES.
- Published in:
- Loyola Law Review, 2020, v. 66, n. 1, p. 183
- By:
- Publication type:
- Article
RILEY AND ABANDONMENT: EXPANDING FOURTH AMENDMENT PROTECTION OF CELL PHONES.
- Published in:
- Northwestern University Law Review, 2017, v. 111, n. 2, p. 517
- By:
- Publication type:
- Article
Reading Together.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article