Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-9 of 9 total results
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
 Facial Recognition using OpenCV - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
 Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
 Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
https://arxiv.org/pdf/1201.0395
Average Rating (0 votes)
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.
 Information Security Standards - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 129 interchangeability - and at an economical cost. We need information security standards in order to implement information security controls to meet an organizations requirements as well as a set of controls
 Binary Code Disassembly for Reverse Engineering
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 4, 2012 ISSN 2067 – 4074 235 Figure 3. Disassembled code of the COM file in td.exe After the assembly instruction int 21h, the next 6 bytes are used to store data in the COM file. The application td.exe considers the 6 bytes as operation codes for binary