𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Mobile madness: securing the endpoint

✍ Scribed by Ken Salchow Jr


Publisher
Elsevier Science
Year
2006
Weight
63 KB
Volume
3
Category
Article
ISSN
1742-6847

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Securing the mobile device
✍ Bruce Potter πŸ“‚ Article πŸ“… 2004 πŸ› Elsevier Science 🌐 English βš– 98 KB
Securing the global, remote, mobile user
✍ Walt Curtis; Lori Sinton πŸ“‚ Article πŸ“… 1999 πŸ› John Wiley and Sons 🌐 English βš– 957 KB

## Securing the Global, Remote, Mobile User Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls for

The security challenges for mobile ubiqu
✍ Adrian Leung; Yingli Sheng; Haitham Cruickshank πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier Science 🌐 English βš– 581 KB

It is envisaged that in future mobile ubiquitous environments, users will be able to seamlessly, search, access and consume a rich offering of services and content from an array of Service/Content Providers, whilst they are on the move, anytime, anywhere. Unfortunately, this new computing paradigm a

Future consumer mobile phone security: A
✍ AndrΓ© van Cleeff πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 250 KB

Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

Scalable key management for secure multi
✍ Jiannong Cao; Lin Liao; Guojun Wang πŸ“‚ Article πŸ“… 2006 πŸ› Elsevier Science 🌐 English βš– 669 KB

The proliferation of the Internet computing and mobile computing technologies gives rise to the growth of mobile Internet applications. There are increasing demands on secure multicast services in the mobile Internet environment. An important issue in secure group communication is key management, wh

Lightweight and provably secure user aut
✍ Chun Chen; Daojing He; Sammy Chan; Jiajun Bu; Yi Gao; Rong Fan πŸ“‚ Article πŸ“… 2011 πŸ› John Wiley and Sons 🌐 English βš– 457 KB

## Abstract Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recent