Works matching DE "MOBILE communication system security"
Results: 79
Edge Computing Security of Mobile Communication System Based on Computer Algorithms.
- Published in:
- International Journal of Cooperative Information Systems, 2025, v. 34, n. 1, p. 1, doi. 10.1142/S0218843024500023
- By:
- Publication type:
- Article
Security and Privacy in Wireless and Mobile Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 2, p. 18, doi. 10.3390/fi10020018
- By:
- Publication type:
- Article
Practical Attacks on Mobile Cellular Networks and Possible Countermeasures.
- Published in:
- Future Internet, 2013, v. 5, n. 4, p. 474, doi. 10.3390/fi5040474
- By:
- Publication type:
- Article
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- By:
- Publication type:
- Article
An Architecture for Agile Systems Engineering of Secure Commercial Off-the-Shelf Mobile Communications.
- Published in:
- Systems Engineering, 2017, v. 20, n. 1, p. 71, doi. 10.1002/sys.21379
- By:
- Publication type:
- Article
Offline Mode for Corporate Mobile Client Security Architecture.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 4, p. 743, doi. 10.1007/s11036-017-0839-4
- By:
- Publication type:
- Article
A Survey on Security in D2D Communications.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 2, p. 195, doi. 10.1007/s11036-016-0741-5
- By:
- Publication type:
- Article
Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks.
- Published in:
- Mobile Networks & Applications, 2015, v. 20, n. 6, p. 840, doi. 10.1007/s11036-015-0619-y
- By:
- Publication type:
- Article
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 64, doi. 10.1007/s11036-013-0462-y
- By:
- Publication type:
- Article
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
MobiSens: A Versatile Mobile Sensing Platform for Real-World Applications.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 1, p. 60, doi. 10.1007/s11036-012-0422-y
- By:
- Publication type:
- Article
A Privacy-Considerate Framework for Identity Management in Mobile Services.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 446, doi. 10.1007/s11036-011-0325-3
- By:
- Publication type:
- Article
On Address Privacy in Mobile Ad Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 2, p. 188, doi. 10.1007/s11036-008-0142-5
- By:
- Publication type:
- Article
Broadcast Security in Future Mobile Networks.
- Published in:
- Electronics & Electrical Engineering, 2014, v. 20, n. 10, p. 69, doi. 10.5755/j01.eee.20.10.6392
- By:
- Publication type:
- Article
Rogue Smartphones.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 2, p. 6
- By:
- Publication type:
- Article
Securing VoIP in SIP Mobile Network.
- Published in:
- World of Computer Science & Information Technology Journal, 2015, v. 5, n. 1, p. 6
- By:
- Publication type:
- Article
Mobile Application Threats and Security.
- Published in:
- World of Computer Science & Information Technology Journal, 2014, v. 4, n. 5, p. 57
- By:
- Publication type:
- Article
OWL ONTOLOGY REPRESENTATION UNDER A SECURE MOBILE CONTEXT.
- Published in:
- Journal of Information Systems & Operations Management, 2011, v. 5, n. 2, p. 220
- By:
- Publication type:
- Article
An improved authentication scheme for mobile satellite communication systems.
- Published in:
- International Journal of Satellite Communications & Networking, 2015, v. 33, n. 2, p. 135, doi. 10.1002/sat.1079
- By:
- Publication type:
- Article
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 612, doi. 10.1007/s12083-013-0220-8
- By:
- Publication type:
- Article
Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?
- Published in:
- Journal of Medical Internet Research, 2015, v. 17, n. 11, p. 1, doi. 10.2196/medinform.4797
- By:
- Publication type:
- Article
Letter from the editor.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 1, doi. 10.1002/jcaf.20699
- By:
- Publication type:
- Article
Your firm's mobile devices: How secure are they?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 13, doi. 10.1002/jcaf.20701
- By:
- Publication type:
- Article
Mobile Software for Enhancing Cyberculture.
- Published in:
- eLearning & Software for Education, 2018, v. 4, p. 93, doi. 10.12753/2066-026X-18-228
- By:
- Publication type:
- Article
Advanced Information Security Management Evaluation System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 6, p. 1192, doi. 10.3837/tiis.2011.06.006
- By:
- Publication type:
- Article
Robustness of Face Recognition to Variations of Illumination on Mobile Devices Based on SVM.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 1, p. 25, doi. 10.3837/tiis.2010.01.002
- By:
- Publication type:
- Article
Fault-Tolerant Control of the Road Wheel Subsystem in a Steer-By-Wire System.
- Published in:
- International Journal of Vehicular Technology, 2008, v. 2008, p. 1
- By:
- Publication type:
- Article
Wireless Network Security Based on the Image Address Masking (IAM) Mechanism.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 23, doi. 10.1007/s11277-018-5664-y
- By:
- Publication type:
- Article
Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 859, doi. 10.1007/s11277-017-4541-4
- By:
- Publication type:
- Article
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 3, p. 1273, doi. 10.3837/tiis.2016.03.018
- By:
- Publication type:
- Article
A NEW FINGERPRINT BIOMETRIC REMOTE USER AUTHENTICATION SCHEME USING CHAOTIC HASH FUNCTION ON MOBILE DEVICES.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 3, p. 471, doi. 10.1080/10798587.2010.10643094
- By:
- Publication type:
- Article
Mobile Security Issues Come to the Forefront.
- Published in:
- IEEE Internet Computing, 2012, v. 16, n. 3, p. 7, doi. 10.1109/MIC.2012.54
- By:
- Publication type:
- Article
A mobile authentication system resists to shoulder-surfing attacks.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 22, p. 14075, doi. 10.1007/s11042-015-3129-9
- By:
- Publication type:
- Article
Detecting age groups using touch interaction based on neuromotor characteristics.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 20, p. 1349, doi. 10.1049/el.2017.0492
- By:
- Publication type:
- Article
Secured measurement fusion scheme against deceptive ECM attack in radar network.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3911, doi. 10.1002/sec.1543
- By:
- Publication type:
- Article
Securing mobile access with interactive image code and image key encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3412, doi. 10.1002/sec.1548
- By:
- Publication type:
- Article
Enforcing mobile security with location-aware role-based access control.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- By:
- Publication type:
- Article
Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2973, doi. 10.1002/sec.1223
- By:
- Publication type:
- Article
Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3205, doi. 10.1002/sec.1245
- By:
- Publication type:
- Article
A static Android malicious code detection method based on multi-source fusion.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3238, doi. 10.1002/sec.1248
- By:
- Publication type:
- Article
GBAAM: group-based access authentication for MTC in LTE networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3282, doi. 10.1002/sec.1252
- By:
- Publication type:
- Article
An architecture for secure mobile devices.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 10, p. 1958, doi. 10.1002/sec.1028
- By:
- Publication type:
- Article
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 3, p. 418, doi. 10.1002/sec.990
- By:
- Publication type:
- Article
UFLE: a user-friendly location-free encryption system for mobile users.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1477, doi. 10.1002/sec.615
- By:
- Publication type:
- Article
A novel approach to detection of mobile rogue access points.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1510, doi. 10.1002/sec.756
- By:
- Publication type:
- Article
An efficient fair UC-secure protocol for two-party computation.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1253, doi. 10.1002/sec.857
- By:
- Publication type:
- Article
Wireless security: securing mobile UMTS communications from interoperation of GSM.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 4, p. 498, doi. 10.1002/sec.674
- By:
- Publication type:
- Article
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 1, p. 3, doi. 10.1002/sec.341
- By:
- Publication type:
- Article
Vulnerabilities and Attacks in Global System for Mobile Communication (GSM).
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 139
- By:
- Publication type:
- Article
Modifying the structure KASUMI to improve its resistance towards attacks by inserting FSM and S-Box.
- Published in:
- Journal of Cyber Security Technology, 2018, v. 2, n. 1, p. 37, doi. 10.1080/23742917.2018.1485415
- By:
- Publication type:
- Article