Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 4 of 4)
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks