Mobile security

Results: 2765



#Item
81MOBILE AND UBIQUITOUS SYSTEMS  www.computer.org/pervasive Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H.

MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H.

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:02
82Mobile Printing User Guide

Mobile Printing User Guide

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-08 02:39:18
83Report  McAfee Labs Threats Report June 2016

Report McAfee Labs Threats Report June 2016

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2016-06-13 16:14:00
84An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:47:09
85ConsentID_datasheet1.indd

ConsentID_datasheet1.indd

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:55
86Language-based security for mobile code with applications to smart cards Xavier Leroy INRIA Rocquencourt  &

Language-based security for mobile code with applications to smart cards Xavier Leroy INRIA Rocquencourt &

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2005-01-12 04:26:34
87QXP_Layout:22 AM Page 1  ONLINE SERVICE AGREEMENT

QXP_Layout:22 AM Page 1 ONLINE SERVICE AGREEMENT

Add to Reading List

Source URL: www.adambank.com

Language: English
88When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments Jon Oberheide Farnam Jahanian

When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments Jon Oberheide Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:00
89Abstract  Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
90CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:54