Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 3 of 3)
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE