Search Results - "mobile security"
-
1
Mobile security and privacy in smartphone technology
Published 2015“…However, in this paper we highlighted mobile phone security and recommendation for mobile security.…”
Get full text
Get full text
-
2
-
3
The influence of user mobility in mobile virus propagation: An enterprise mobile security perspective
Published 2015“…In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. …”
Get full text
-
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
-
5
Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
Published 2015“…New insights for researchers and business world interested in the unified solutions for NFCcompatible smartphone, access control and mobile security are provided.…”
Get full text
-
6
Secure scheme for user authentication and authorization in android environment
Published 2013“…However, due to various lethal threats on mobile security systems, it can be said that existing security is not sufficient. …”
Get full text
Get full text
-
7
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…Mobile malware is a serious threat in mobile security. Malware detector is the primary tool and first defense to protect mobile device against mobile malware. …”
Get full text
Get full text
-
8
Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
Published 2017“…On the other hand, mobile devices are not well protected compared to computers and their users pay less attention to security updates and solutions , therefore, these new capabilities (e.g. high internet speed and processing power) have motivated the attackers to migrate to mobile infrastructures. Thus, mobile security has become a crucial issue in BYOD or Bring Your Own Device as the employees use their own mobile devices to access an organization data and systems. …”
Get full text
-
9
Development and analysis of face recognition system on a mobile robot environment / Jit Shen Quah and Mariam Md Ghazaly
Published 2018“…However it is apparent that as technology advances, even more so in the direction of mobile robots such as a mobile security surveillance robot or a humanoid robot, the application of face recognition would need to transition from the traditional fixed position recognition to a mobile environment recognition as well. …”
Get full text
-
10
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…The vast spread and increased capabilities of these devices have come with major challenges to mobile security and data confidentiality. Every year different threats against sensitive data resting inside the storage of these mobile devices continue to rise sharply. …”
Get full text
Get full text
-
11
Fog computing, applications , security and challenges, review
Published 2018“…Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. …”
Get full text
-
12
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
Published 2019“…This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. …”
Get full text
Get full text