Works matching DE "MOBILE communication system security"
1
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- Ramadan, Mohammed;
- Guohong Du;
- Fagen Li;
- Chunxiang Xu
- Article
2
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 2, p. 6
- Article
3
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 20, p. 1349, doi. 10.1049/el.2017.0492
- Hernandez-Ortega, J.;
- Morales, A.;
- Fierrez, J.;
- Acien, A.
- Article
4
- Telkomnika, 2018, v. 16, n. 3, p. 1135, doi. 10.12928/TELKOMNIKA.v16i3.8545
- Abdullah, Hamsa A.;
- Abdullah, Hikmat N.
- Article
5
- IUP Journal of Science & Technology, 2010, v. 6, n. 4, p. 35
- Nonyelum, Ogwueleka Francisca
- Article
6
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 1, doi. 10.1002/jcaf.20699
- Article
7
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 13, doi. 10.1002/jcaf.20701
- Wright Jr., Harry R.;
- Mooney, J. Lowell;
- Parham, Abbie Gail
- Article
8
- Journal of Applied Security Research, 2018, v. 13, n. 1, p. 63, doi. 10.1080/19361610.2018.1387838
- Article
9
- Mobile Networks & Applications, 2017, v. 22, n. 4, p. 743, doi. 10.1007/s11036-017-0839-4
- Galibus, Tatiana;
- C. L da Costa, Jo ao;
- Galdo, Giovanni;
- de B. Vieira, Thiago;
- O. Albuquerque, Robson;
- T. de Sousa Júnior, Rafael;
- Freitas, Edison;
- Krasnoproshin, Viktor;
- Zaleski, Anton;
- Vissia, H.
- Article
10
- Mobile Networks & Applications, 2017, v. 22, n. 2, p. 195, doi. 10.1007/s11036-016-0741-5
- Article
11
- Mobile Networks & Applications, 2015, v. 20, n. 6, p. 840, doi. 10.1007/s11036-015-0619-y
- Lyu, Saixia;
- Liu, Jianxun;
- Tang, Mingdong;
- Xu, Yu;
- Chen, Jinjun
- Article
12
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 64, doi. 10.1007/s11036-013-0462-y
- Article
13
- 2014
- Kambourakis, Georgios;
- Martinez, Gregorio;
- Gomez Marmol, Felix
- Editorial
14
- Mobile Networks & Applications, 2013, v. 18, n. 1, p. 60, doi. 10.1007/s11036-012-0422-y
- Wu, Pang;
- Zhu, Jiang;
- Zhang, Joy
- Article
15
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 446, doi. 10.1007/s11036-011-0325-3
- Álamo, José;
- Fernández, Antonio;
- Trapero, Rubén;
- Yelmo, Juan;
- Monjas, Miguel
- Article
16
- Mobile Networks & Applications, 2009, v. 14, n. 2, p. 188, doi. 10.1007/s11036-008-0142-5
- Article
17
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 6, p. 297, doi. 10.1080/19393555.2012.738374
- Article
18
- eLearning & Software for Education, 2018, v. 4, p. 93, doi. 10.12753/2066-026X-18-228
- TURCU, Dănuț;
- SPÂRLU, Florin
- Article
19
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/402541
- Shaukat, Haafizah Rameeza;
- Hashim, Fazirulhisyam;
- Sali, Aduwati;
- Abdul Rasid, M. Fadlee
- Article
20
- International Journal of Cooperative Information Systems, 2025, v. 34, n. 1, p. 1, doi. 10.1142/S0218843024500023
- Article
21
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 6, p. 1192, doi. 10.3837/tiis.2011.06.006
- Heasuk Jo;
- Seungjoo Kim;
- Dongho Won
- Article
22
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 1, p. 25, doi. 10.3837/tiis.2010.01.002
- Gi Pyo Nam;
- Byung Jun Kang;
- Kang Ryoung Park
- Article
23
- Sensors (14248220), 2011, v. 11, n. 3, p. 2496, doi. 10.3390/s110302496
- Article
24
- International Journal on Information Technologies & Security, 2015, v. 7, n. 2, p. 17
- Mäkelä, Sanna;
- Mäkelä, Sami;
- Leppänen, Ville
- Article
25
- Telecommunication Systems, 2018, v. 69, n. 4, p. 431, doi. 10.1007/s11235-018-0446-0
- Odelu, Vanga;
- Zeadally, Sherali;
- Das, Ashok Kumar;
- Wazid, Mohammad;
- He, Debiao
- Article
26
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3911, doi. 10.1002/sec.1543
- Yang, Chaoqun;
- Zhang, Heng;
- Qu, Fengzhong;
- Shi, Zhiguo
- Article
27
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3412, doi. 10.1002/sec.1548
- Bae, Mungyu;
- Lee, Jiyeon;
- Lee, Suk Kyu;
- Kim, Hwangnam
- Article
28
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- Ulltveit-Moe, Nils;
- Oleshchuk, Vladimir
- Article
29
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2973, doi. 10.1002/sec.1223
- DelBello, Chris;
- Raihan, Kazi;
- Zhang, Tao
- Article
30
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3205, doi. 10.1002/sec.1245
- Cheng, Xiang;
- Su, Sen;
- Teng, Yiping;
- Xiao, Ke
- Article
31
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3238, doi. 10.1002/sec.1248
- Du, Yao;
- Wang, Xiaoqing;
- Wang, Junfeng
- Article
32
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3282, doi. 10.1002/sec.1252
- Cao, Jin;
- Ma, Maode;
- Li, Hui
- Article
33
- Security & Communication Networks, 2015, v. 8, n. 10, p. 1958, doi. 10.1002/sec.1028
- Article
34
- Security & Communication Networks, 2015, v. 8, n. 3, p. 418, doi. 10.1002/sec.990
- Maity, Soumya;
- Ghosh, Soumya K.;
- Al-Shaer, Ehab
- Article
35
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1477, doi. 10.1002/sec.615
- He, Yi-Jun;
- Chan, Patrick P. F.;
- Hui, Lucas C. K.;
- Yiu, S. M.
- Article
36
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1510, doi. 10.1002/sec.756
- Kim, Iluk;
- Seo, Jungtaek;
- Shon, Taeshik;
- Moon, Jongsub
- Article
37
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1253, doi. 10.1002/sec.857
- Ruan, Ou;
- Chen, Jing;
- Zhou, Jing;
- Cui, Yongquan;
- Zhang, Mingwu
- Article
38
- Security & Communication Networks, 2013, v. 6, n. 4, p. 498, doi. 10.1002/sec.674
- Southern, Eric;
- Ouda, Abdelkader;
- Shami, Abdallah
- Article
39
- Security & Communication Networks, 2012, v. 5, n. 1, p. 3, doi. 10.1002/sec.341
- Damopoulos, Dimitrios;
- Menesidou, Sofia A.;
- Kambourakis, Georgios;
- Papadaki, Maria;
- Clarke, Nathan;
- Gritzalis, Stefanos
- Article
40
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/564506
- Lee, Eunmi;
- Yeh, Hongjin;
- Yang, Hyo-Sik;
- Moon, Seungbin;
- Choi, Okkyung
- Article
41
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 3, p. 1273, doi. 10.3837/tiis.2016.03.018
- Yanrong Lu;
- Lixiang Li;
- Haipeng Peng;
- Yixian Yang
- Article
42
- International Journal of Vehicular Technology, 2008, v. 2008, p. 1
- Broustis, Ioannis;
- Faloutsos, Michalis
- Article
43
- Multimedia Tools & Applications, 2016, v. 75, n. 22, p. 14075, doi. 10.1007/s11042-015-3129-9
- Luo, Jia-Ning;
- Yang, Ming-Hour
- Article
44
- Systems Engineering, 2017, v. 20, n. 1, p. 71, doi. 10.1002/sys.21379
- Gump, Jamieson;
- Mazzuchi, Thomas;
- Sarkani, Shahram
- Article
45
- IT Professional, 2011, v. 13, n. 4, p. 9, doi. 10.1109/MITP.2011.73
- Quirolgico, Steve;
- Voas, Jeffrey;
- Kuhn, Rick
- Article
46
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 2, p. 150, doi. 10.1109/TDSC.2014.2320731
- Shebaro, Bilal;
- Oluwatimi, Oyindamola;
- Bertino, Elisa
- Article
47
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 6, p. 930, doi. 10.1109/TDSC.2012.72
- Jackson, Jennifer T.;
- Creese, Sadie
- Article
48
- Sensors (14248220), 2019, v. 19, n. 10, p. 2310, doi. 10.3390/s19102310
- Jung, Younchan;
- Peradilla, Marnel;
- Agulto, Ronnel
- Article
49
- Sensors (14248220), 2016, v. 16, n. 10, p. 1694, doi. 10.3390/s16101694
- Solano, Antonio;
- Dormido, Raquel;
- Duro, Natividad;
- González, Víctor
- Article
50
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6646, doi. 10.1007/s11227-017-2155-y
- Yoon, Hyunsoo;
- Lee, Yun-kyung;
- Kim, Jeong-nyeo;
- Lim, Kyung-Soo
- Article