Essays about: "mobile security advantages"

Showing result 1 - 5 of 14 essays containing the words mobile security advantages.

  1. 1. Investigation on 5G Techniques for a College Scenario

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Xiaohan Wang; [2022]
    Keywords : Technology and Engineering;

    Abstract : With the development of telecommunication technology, the mobile networks are being updated. 5G is the fifth generation mobile communication, which can provide a higher data rate, lower latency, more connections, higher security insurance, and more flexible business deployment capabilities than 4G. READ MORE

  2. 2. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE

  3. 3. SUSTAINABLE COMPETITIVE ADVANTAGES IN THE INDUSTRY OF MOBILE GAMBLING

    University essay from KTH/Nationalekonomi

    Author : GUSTAV HÄHLE; [2016]
    Keywords : Online gambling; mobile gambling; gaming; competitive advantage; resource-based;

    Abstract : This study investigates how firms in the mobile gambling industry can develop long-term competitive advantages through utilizing firm specific resources and capabilities. The aim of this research is to connect classical theoretical knowledge with the challenges the modern industry of mobile gambling is facing. READ MORE

  4. 4. Two-factor Authentication in Smartphones: Implementations and Attacks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Christofer Ericson; [2015]
    Keywords : Technology and Engineering;

    Abstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE

  5. 5. Diffusion of innovation at the bottom of the pyramid: the impact of a payment system on the adoption of electricity in rural Uganda

    University essay from KTH/Entreprenörskap och Innovation

    Author : Jonas Eder; Christopher Mutsaerts; [2013]
    Keywords : Diffusion of innovation; crossing the chasm; bottom of the pyramid; renewable electricity; payment system; Uganda;

    Abstract : This thesis analyses how a payment system affects the diffusion of renewable electricity in rural Uganda. A case study is used provided by a start-up company named Pamoja Cleantech. This company is about to sell electricity, which is generated by biomass-based gasification, to a low-income community. READ MORE