Igor et al., 2013 - Google Patents
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.Igor et al., 2013
View PDF- Document ID
- 8612832413947785309
- Author
- Igor Z
- Dmitry M
- Andrey S
- Dmitry K
- Anastasia T
- Alexander Z
- Publication year
- Publication venue
- International Journal of Computer Network & Information Security
External Links
Snippet
This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security …
- 230000000694 effects 0 title abstract description 16
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10445487B2 (en) | Methods and apparatus for authentication of joint account login | |
US8719568B1 (en) | Secure delivery of sensitive information from a non-communicative actor | |
CA2736582C (en) | Authorization of server operations | |
AU2009323748B2 (en) | Secure transaction authentication | |
CN111404696A (en) | Collaborative signature method, security service middleware, related platform and system | |
CN105975867B (en) | A kind of data processing method | |
CN111295861B (en) | Multi-factor authentication | |
Aravindhan et al. | One time password: A survey | |
CA2982865A1 (en) | Method and system for transaction security | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
CN111492614B (en) | multi-factor authentication | |
Tully et al. | Mobile security: a practitioner’s perspective | |
US9143510B2 (en) | Secure identification of intranet network | |
WO2016026333A1 (en) | Data protection method, device and storage medium in connection between terminal and pc | |
Caleb | Phishing and Smishing Attacks | |
Saha et al. | Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs | |
Patidar et al. | A Threat modeling approach to analyze and mitigate WhatsApp attacks: A Review | |
Edwards | Mobile Security | |
Mendyk-Krajewska et al. | Threats to wireless technologies and mobile devices and company network safety | |
Streff et al. | An Examination of Information Security in Mobile Banking Architectures | |
Mooney et al. | Your Guide to Authenticating Mobile Devices | |
KR102082356B1 (en) | User authentication system and method thereof, and apparatus applied to the same | |
Daneshgadeh et al. | Security Issues of Smartphones Regarding M-Commerce | |
Tu et al. | New Threats to SMS-Assisted Mobile Internet Services from 4G LTE |