𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Mobile secure telephones

✍ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
129 KB
Volume
15
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Secure mobile agents with controlled res
✍ Qi Zhang; Yi Mu; Minjie Zhang; Robert H. Deng πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 195 KB

## Abstract Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent's

Your firm's mobile devices: How secure a
✍ Harry R. Wright Jr.; J. Lowell Mooney; Abbie Gail Parham πŸ“‚ Article πŸ“… 2011 πŸ› John Wiley and Sons 🌐 English βš– 147 KB

## Abstract Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you

Keeping your globally mobile employees h
✍ Myles Druckman πŸ“‚ Article πŸ“… 2009 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 89 KB

## Abstract Companies are sending higher numbers of older employees to difficult or dangerous locations, which increases the chances of a medical event where healthcare services are least available. Business travelers and international assignees and their employers need to adequately assess and pre

Mobile application security system (MASS
✍ David Floyd πŸ“‚ Article πŸ“… 2006 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 121 KB