Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...r of global operators that would require a dedicated link. This meant that mobile subscribers who wanted to use GPRS whilst roaming could only do so if their ...developed the idea of GRX to handle all roaming between [[PLMN|public land mobile networks]] (PLMNs).<ref>{{cite web|url=http://www.gsma.com/newsroom/wp-cont ...
    3 KB (403 words) - 23:51, 7 October 2023
  • ...icated to be able to "hook" into individual functions within any running [[Mobile app|app]] on an unlocked device and allow deep inspection and modification ...computer security)|security exploits]] to gain some level of access to a [[mobile device]] in a variety of situations and presumed access levels. ...
    16 KB (2,208 words) - 21:04, 3 August 2024
  • ...: Extortion-Based Security Threats and Countermeasures," IEEE Symposium on Security & Privacy, pp. 129-141, 1996.</ref> A cryptovirus is a virus that contains ...d Will Mobile Codes Combat against Computer Viruses. Proc. of the 2002 New Security Paradigms Workshop, 2002</ref><ref>Zakiya M. Tamimi, Javed I. Khan, [http:/ ...
    8 KB (1,175 words) - 06:41, 15 February 2025
  • ...[[subset]] ''D'' of ''V'' such that ''D'' is a [[dominating set]] on which mobile guards are initially located (at most one guard may be located on any verte ...set problem, also known as the eternal domination problem and the eternal security problem, can also be interpreted as a [[combinatorial game]] played between ...
    15 KB (2,216 words) - 02:07, 28 February 2025
  • {{See also|Mobile location analytics}} ...|first3=Robert|title=Proceedings of the 32nd Annual Conference on Computer Security Applications |chapter=Decomposition of MAC address structure for granular d ...
    8 KB (1,139 words) - 22:44, 21 November 2024
  • ...|last5=Ryu |first5=Kwon Ho |last6=Lee |first6=Dong-Geon |title=Information Security Applications |chapter=LEA: A 128-Bit Block Cipher for Fast Encryption on Co ...3246). LEA is included in the ISO/IEC 29192-2:2019 standard ([[Information security]] - Lightweight cryptography - Part 2: Block ciphers). ...
    19 KB (2,649 words) - 15:58, 26 January 2024
  • ...edings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks ...=https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2012/wisec12-ranganathan.pdf ...
    6 KB (956 words) - 11:29, 2 March 2025
  • ...ed]] transmission and data as well as voice transmission. Like other land mobile systems, NXDN systems use the [[very high frequency|VHF]] and [[ultrahigh f ...www.mccmag.com/News/NewsDetails/NewsID/15362 an international digital land mobile system]. ...
    14 KB (1,896 words) - 19:32, 5 February 2025
  • ...owitzer?utm_content=cmp-true#google_vignette | ref={{sfnref | Defense News security global military army equipment industry | 2024}} | access-date=2024-06-11}} ...s and shrapnel. With an operational mass of 32 tons, the 2S43 is much more mobile than other self-propelled guns like the 42-ton [[2S19 Msta]] or other track ...
    7 KB (929 words) - 18:18, 18 February 2025
  • In order to identify a person, a [[security]] system has to compare personal characteristics with a [[database]]. A sca For security systems using [[cameras]], [[Object recognition|people recognition]] has be ...
    11 KB (1,600 words) - 12:46, 12 July 2024
  • '''Proactive secret sharing''' is an underlying technique in '''Proactive Security Protocols.''' ...d [[Moti Yung]] in 1991.<ref>Rafail Ostrovsky, Moti Yung: How to Withstand Mobile Virus Attacks (Extended Abstract). PODC 1991: 51-59 [http://dl.acm.org/cita ...
    9 KB (1,406 words) - 10:35, 25 February 2025
  • ...ce|government services]]. Other private services, such as applying for a [[mobile phone]] contract or opening a [[bank account]], also require a production o ...act, 1963)</ref> However, the card could be forged easily as there was no security features. It could also be damaged easily due to being made with paper. ...
    17 KB (1,854 words) - 03:27, 5 December 2024
  • ...cka (June 26, 2012). [http://www.darkreading.com/insider-threat/167801100/security/news/240002768/new-forensics-method-may-nab-insider-thieves.html "New Foren ...sis of Offline E-cash Systems with Malicious Insider". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(1/2), 55-71. ...
    8 KB (1,082 words) - 16:57, 26 January 2023
  • == Security Issues == ...ean Pierre Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.</ref> Each vehicle comes with a government issued publi ...
    14 KB (2,173 words) - 20:35, 20 February 2025
  • ...[decryption]] by national intelligence agencies, especially the [[National Security Agency]] (NSA).<ref>{{cite web|url=https://www.eff.org/document/crypto-wars ...ward, [[Netscape Communications Corporation|Netscape]]'s [[Transport Layer Security|SSL]] technology was widely adopted as a method for protecting credit card ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • ...tive fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network |year=2017|chapter-url=|location=Palladam|volume=|pages=727– ...diverse engineering applications<ref name=":3" /> that range from network security,<ref name=":12" /><ref>{{Cite journal|last=Selvi M and Ramakrishnan B|year= ...
    17 KB (2,373 words) - 06:46, 4 January 2024
  • ...oting – A case study from Durga Puja trial |journal=Journal of Information Security and Applications |date=March 2024 |volume=81 |pages=103719 |doi=10.1016/j.j ...ing Station Voting |url=https://eprint.iacr.org/2020/650.pdf |journal=IEEE Security & Privacy |volume=18 |issue=6 |pages=6–13 |doi=10.1109/MSEC.2020.3002728|s2 ...
    12 KB (1,867 words) - 22:36, 14 February 2025
  • .../20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf |archive-date=2013-03-31 |website=[[Intel Corporatio ** Mobile: all Core i7 and Core i5. Several vendors have shipped [[BIOS]] configurati ...
    26 KB (3,426 words) - 11:47, 22 February 2025
  • ...dent identity cards from the local [[Public security bureau (China)|Public Security Bureau]], sub-bureaus or local executive police stations.<ref name="中华人民共和国 ...民共和国居民身份证条例(失效)【1985-09-06】]</ref> At that point, the [[Ministry of Public Security of the People's Republic of China]] created a unified authority responsible ...
    29 KB (3,655 words) - 15:31, 18 February 2025
  • ...2011-04-01|title=Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments |journal=GeoInformatica|language=en|volume=15|iss ...with some external information.<ref name=":82" /> For example, the social security number could be used to identify a specific user by adversaries,<ref name=" ...
    55 KB (7,739 words) - 07:36, 21 December 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)