• No results found

[PDF] Top 20 Security Aspects in Internet and Mobile Communication

Has 10000 "Security Aspects in Internet and Mobile Communication" found on our website. Below are the top 20 most common "Security Aspects in Internet and Mobile Communication".

Security Aspects in Internet and Mobile Communication

Security Aspects in Internet and Mobile Communication

... different security measures, like, Web browsers are enabled to use public-key infrastructures for cryptographic key distribution and to use cryptographic ...Infelicitously, communication security ... See full document

10

Internet of Things System Based on Mobile Communication Network

Internet of Things System Based on Mobile Communication Network

... standardized Internet of Things (IoT) system, a specific scheme based on the bandwidth and quality of service (QoS) analysis as well as the third generation mobile communication sys- tem is ...the ... See full document

13

Revisiting Security Aspects of Internet of Things for Self Managed Devices

Revisiting Security Aspects of Internet of Things for Self Managed Devices

... is Internet of ...other mobile devices is a common scenario .But the data communication can also take place between various things, objects, components like from washing machine to a mobile ... See full document

8

Practical security aspects of the internet of things

Practical security aspects of the internet of things

... Adding security as an “ afterthought ” to an existing design has the potential to be inadequate or causing long term issues that can become expensive or even dan- ...with security in mind becomes an ... See full document

18

Is 5G Ready For The Social Internet Of Things World?

Is 5G Ready For The Social Internet Of Things World?

... in mobile communication is presently happening today concerning affordable gigabit cellular ...residential Internet of Things (IoT) applications that rely on “always on” internet ...new ... See full document

8

A New Access Control Plan to Create a New Database of Information about the Basis on the Internet of Things

A New Access Control Plan to Create a New Database of Information about the Basis on the Internet of Things

... digital mobile telephone system that's broadly utilized in many parts around the ...in mobile telecoms during the last ...wireless mobile telecommunication which includes High-Speed Circuit-Switched ... See full document

7

Index Terms - mobile technology, mobile banking, information

Index Terms - mobile technology, mobile banking, information

... that mobile banking provides a new opportunity in terms of delivery speed and quality of services to ...several security issues that customers are concerned ...and security challenges in Iran, CBI ... See full document

6

The Internet of Things Applications for Challenges and Related Future Technologies & Development

The Internet of Things Applications for Challenges and Related Future Technologies & Development

... The Internet of Things (IoT) my report and studies, we can say that this sector is now in the first steps of evolution or development and have a lot of possible ...the Internet of ...investment. ... See full document

7

An analysis of internet accounts’ security threats by mobile phone password protection

An analysis of internet accounts’ security threats by mobile phone password protection

... the security threats of mobile phone password protection and puts forward corresponding solutions or preventing ...three aspects. For the public, they can acquaint with the security threats of ... See full document

7

SECURITY OF MOBILE PAYMENT SYSTEMS: A REVIEW

SECURITY OF MOBILE PAYMENT SYSTEMS: A REVIEW

... the Internet of Things (IoT ) to expand their reach and offer a fast and convenient service to ...The mobile payments reduce the cost of traditional payments transaction but face a severe problem of ... See full document

13

A Comparative Study Of Smartphone Users Perception And Preference Towards Mobile Payment Methods In The U.S. And Korea

A Comparative Study Of Smartphone Users Perception And Preference Towards Mobile Payment Methods In The U.S. And Korea

... broadband mobile services in the early 2000s (Yoo, Lyytinen, & Yang, 2005) and Korea is well known as the world’s first mobile service with receiving a TV signal (Shim, Shin, & Weiss, ...of ... See full document

12

ICT, Information Asymmetry and Market Power in the African Banking Industry

ICT, Information Asymmetry and Market Power in the African Banking Industry

... and communication technology ...between internet penetration and public credit registries reduces market power in the 75 th quartile and (ii) the interaction between mobile phone penetration and ... See full document

31

Analysis and Prediction of Mobile Internet Users’ Behavior Preferences

Analysis and Prediction of Mobile Internet Users’ Behavior Preferences

... of mobile Internet and the growing popularity of smart phones, the influence scope of mobile Internet is expanding, there are more and more people tend to use mobile Internet, ... See full document

6

The Developed Security System Based on Communication Technology with Internet Networks

The Developed Security System Based on Communication Technology with Internet Networks

... the security with simple devices and low ...a security alert system based on advanced Internet of Thing to detect an intruder or any unusual event at ...home security system and flexible ... See full document

5

The Array Microstrip Antenna for Mobile-Internet of Satellite Energy Communication

The Array Microstrip Antenna for Mobile-Internet of Satellite Energy Communication

... for mobile-internet of satellite energy communication having a high gain in the case multimedia communications performing large-capacity data communication is ...for ... See full document

10

The Internet of Things Requires Enhanced Security Guidelines for the Future

The Internet of Things Requires Enhanced Security Guidelines for the Future

... A security research and software development engineer at Tripwire named Lane Thames wrote, “The Industrial Internet of Things will drastically change the future, not just for industrial systems, but also ... See full document

6

Title: A Survey Report on Video Encryption and Decryption Techniques

Title: A Survey Report on Video Encryption and Decryption Techniques

... of security management is to provide authentication of users, integrity, accuracy and safety of data ...high security, computational efficiency, compression efficiency and so ...of security is ... See full document

5

Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process

Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process

... And he said ‘I want to go into a room with you. I want to discuss this in a room’. And he’s a big, big man. And I just said to him ‘No, we’re going to talk at one of the other counters. We’ll sit down, face to face and ... See full document

15

A Wireless Health Outcomes Monitoring System (WHOMS): development and field testing with cancer patients using mobile phones

A Wireless Health Outcomes Monitoring System (WHOMS): development and field testing with cancer patients using mobile phones

... Reply always keeps the focus on innovation and know- how: wireless technology and programming devices are key drivers of Reply business development in order to build advanced and effective mobile solutions. Com- ... See full document

13

The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission

The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission

... of mobile communication technology has become a dazzling star in the information ...third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, ... See full document

7

Show all 10000 documents...