Nothing Special   »   [go: up one dir, main page]

Igor et al., 2013 - Google Patents

Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.

Igor et al., 2013

View PDF
Document ID
8612832413947785309
Author
Igor Z
Dmitry M
Andrey S
Dmitry K
Anastasia T
Alexander Z
Publication year
Publication venue
International Journal of Computer Network & Information Security

External Links

Snippet

This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10445487B2 (en) Methods and apparatus for authentication of joint account login
US8719568B1 (en) Secure delivery of sensitive information from a non-communicative actor
CA2736582C (en) Authorization of server operations
AU2009323748B2 (en) Secure transaction authentication
CN111404696A (en) Collaborative signature method, security service middleware, related platform and system
CN105975867B (en) A kind of data processing method
CN111295861B (en) Multi-factor authentication
Aravindhan et al. One time password: A survey
CA2982865A1 (en) Method and system for transaction security
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
CN111492614B (en) multi-factor authentication
Tully et al. Mobile security: a practitioner’s perspective
US9143510B2 (en) Secure identification of intranet network
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc
Caleb Phishing and Smishing Attacks
Saha et al. Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs
Patidar et al. A Threat modeling approach to analyze and mitigate WhatsApp attacks: A Review
Edwards Mobile Security
Mendyk-Krajewska et al. Threats to wireless technologies and mobile devices and company network safety
Streff et al. An Examination of Information Security in Mobile Banking Architectures
Mooney et al. Your Guide to Authenticating Mobile Devices
KR102082356B1 (en) User authentication system and method thereof, and apparatus applied to the same
Daneshgadeh et al. Security Issues of Smartphones Regarding M-Commerce
Tu et al. New Threats to SMS-Assisted Mobile Internet Services from 4G LTE