Essays about: "security mobile"
Showing result 21 - 25 of 294 essays containing the words security mobile.
-
21. iOS vs Android: Security of Inter-App Communication
University essay from Mittuniversitetet/Institutionen för data- och systemvetenskapAbstract : Android and iOS are the world leading mobile operating systems in today’s growing market of handheld devices. Third-party applications are an important aspect of these systems but can also provide an attack-vector for exploiting other installed applications. READ MORE
-
22. SafeHome : A cross-platform mobile application that increases homes network security
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The Internet, considered the most fast-growing technology ever, is starting to arrive in everyone’s homes regularly. No longer just smartphones, computers, or tablets, now even refrigerators, washing machines, and other household appliances support Internet connection. READ MORE
-
23. Investigation on 5G Techniques for a College Scenario
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : With the development of telecommunication technology, the mobile networks are being updated. 5G is the fifth generation mobile communication, which can provide a higher data rate, lower latency, more connections, higher security insurance, and more flexible business deployment capabilities than 4G. READ MORE
-
24. Secure and Private Mobile Crowd Sensing for Street View
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Street View är en populär tjänst som ger mer information än traditionella karttjänster, men den ger också upphov till problem med integriteten. Populära kommersiella street view-tjänster misslyckas vanligtvis med att fullt ut skydda privatlivet för de personer som syns på bilderna. READ MORE
-
25. Enclave Host Interface for Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE