Essays about: "Android smartphone"
Showing result 11 - 15 of 141 essays containing the words Android smartphone.
-
11. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
-
12. Mobile cross-platform gesture- guided visual pain tracking for endometriosis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Rapid growth in mobile technologies since the 2000s is reflected in continued smartphone adoption and the expansion of mobile health (mHealth) smartphone applications for pain assessment. Yet there exists a lack of research-based pain assessment apps for endometriosis, a prevalent yet underrepresented disorder where pain management plays a vital role. READ MORE
-
13. Login hardening with Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE
-
14. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
-
15. BLE Beacon Based Indoor Positioning System in an Office Building using Machine Learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Context: Indoor positioning systems have become more widespread over the past decade, mainly due to devices such as Bluetooth Low Energy beacons which are low at cost and work effectively. The context of this thesis is to localize and help people navigate to the office equipment, meeting rooms, etc. READ MORE