• No results found

[PDF] Top 20 Security and privacy preservation for mobile e-learning via digital identity attributes

Has 10000 "Security and privacy preservation for mobile e-learning via digital identity attributes" found on our website. Below are the top 20 most common "Security and privacy preservation for mobile e-learning via digital identity attributes".

Security and privacy preservation for mobile e-learning via digital identity attributes

Security and privacy preservation for mobile e-learning via digital identity attributes

... (PDA), mobile phones, lap-top computers, pocket computers, ...devices, e-learning system will become a ubiquitous platform for the future of ...access e-learning system anytime and ... See full document

15

Security and Privacy Preservation in Mobile Social Networks

Security and Privacy Preservation in Mobile Social Networks

... real identity will be revealed to the public. Through the security analysis and numerical results, we show that both the bTSE and the extended SrTSE are secure against the possible ... See full document

165

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

... based mobile security is that, the security systems are run in the cloud for ensuring security of the ...the mobile phones are usually scarce. So the resource usages of the ... See full document

5

Security and Privacy for Mobile Social Networks

Security and Privacy for Mobile Social Networks

... machine learning scheme with privacy preservation to outsource the heavy computation tasks to the powerful cloud server- ...user privacy are achieved with the advantages of the adopted leveled ... See full document

153

Digital identity design and privacy preservation for e-learning

Digital identity design and privacy preservation for e-learning

... matters via the online environment. In the e-learning environment, the technical experts give the technical support by building an effective platform and a user-friendly running ...better ... See full document

9

Enhancing mobile learning security

Enhancing mobile learning security

... simple mobile device screen lock mechanisms such as Pattern, Pin or Password which may prevent unauthorized access to the device as well as the learning content in ...The learning documents stored on ... See full document

16

Mobile learning security in Nigeria

Mobile learning security in Nigeria

... landmark mobile malware that spreads by sending itself via MMS to all contacts in the address ...as mobile IM usage grows, new forms of attacks on mobile devices are likely to appear, such as ... See full document

253

Digital Preservation of a Process and its Application to e-science Experiments

Digital Preservation of a Process and its Application to e-science Experiments

... of Preservation Approaches process is re- sponsible for the identification and evaluation of different preservation approaches for the ...The preservation requirements of the process are specified ... See full document

8

A Scheme of Privacy Protection in Mobile Identity Authentication Based on SMS

A Scheme of Privacy Protection in Mobile Identity Authentication Based on SMS

... many mobile apps are developed such as hotel reservation, train and flight reservation, online reading, the reservation of the online hospital registration ...for identity authentication when users log in, ... See full document

7

CLOUD ASSISTED E-LEARNING FRAMEWORK WITH PRIVACY AND SECURITY ENSURED DATA VERIFICATION SERVICES

CLOUD ASSISTED E-LEARNING FRAMEWORK WITH PRIVACY AND SECURITY ENSURED DATA VERIFICATION SERVICES

... The e-learning applications are build with the support of the cloud ...process. Privacy ensured public data verification scheme is build with data dynamism, version management, traceability and ... See full document

5

Improving security and privacy in current mobile systems

Improving security and privacy in current mobile systems

... ternational mobile anonymous number (IMAN), that is derived independently by both the HN and the UE; this allows the scheme to avoid any changes to the operation of the intermediate network ... See full document

230

Privacy and Security in Mobile Cloud Computing: Review

Privacy and Security in Mobile Cloud Computing: Review

... various security and privacy challenges. Security and privacy issues in mobile cloud computing are inherited from cloud computing and mobile ...heavy security algorithm ... See full document

7

Mobile & Wireless Network Security & Privacy pdf

Mobile & Wireless Network Security & Privacy pdf

... Ensuring Security and Privacy 183 his laptop to connect and be admitted to the network, and similar authenti- cation by the laptop to verify the network access point, strict security is generally not ... See full document

232

Mobile application security How security and privacy issues can derail mobile applications. Whitepaper

Mobile application security How security and privacy issues can derail mobile applications. Whitepaper

... developing mobile applications, you should take into consideration which devices and platforms will enable the most security for your customers in the event they lose their ...no mobile platform is ... See full document

8

Security modelling for e-learning

Security modelling for e-learning

... role attributes are defined, the notion of role attributes is very similar to the role parameters ...role attributes into RBAC. We are realising that the role attributes can be used to rebuild ... See full document

6

Attributes of Good E learning Mentors According to Learners

Attributes of Good E learning Mentors According to Learners

... of e-mentoring on learners [7-12, ...students’ learning. Career development comprised five question items such as “My e-mentor provides advice on career ...“My e-mentor offers support and ... See full document

7

Solutions to Security and Privacy Issues in Mobile Social Networking

Solutions to Security and Privacy Issues in Mobile Social Networking

... significant privacy and security risks ...the identity server (IS). Before a user’s mobile device advertises the user’s presence to other nearby mobile and stationary devices, it ... See full document

7

SPE: Security and Privacy Enhancement Framework for Mobile Devices

SPE: Security and Privacy Enhancement Framework for Mobile Devices

... the Security and Privacy Enhanced (SPE) ...that security and privacy policies are ...open mobile operat- ing systems or jailbreaking closed-source operating systems like iOS, the SPE ... See full document

15

Digital and Mobile Security for Mexican Journalists and Bloggers

Digital and Mobile Security for Mexican Journalists and Bloggers

... serious digital risks they ...networks, mobile phones and blogging plat­ forms for their work, they also ad­ mit that they have little or no com­ mand of digital security tools such as ... See full document

16

User Privacy Preservation in Mobile Cloud
          Computing by Two Levels of Spatial Cloaking

User Privacy Preservation in Mobile Cloud Computing by Two Levels of Spatial Cloaking

... cloud and cloud construct the cloaking region and a query set, this anonymous query set send to the untrustworthy LBS. Cloud will segregate the answer set from the LBS and send relevant answer to the requester. Here, the ... See full document

6

Show all 10000 documents...