, Romania
-
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Issues in WiFi Networks
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Mobile Agents Systems in Wireless Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Future Developments in Non-Repudiation in GSM WAP Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Survey of Mobile Digital Rights Management Platforms
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Java and Symbian M-Application Distribution Frameworks
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications - Articles
Security Issues for JME M-Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
Sample Development on Java Smart-Card Electronic Wallet Application
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
Secure Mechanisms for E-Ticketing System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
On-line Payment System Survey – eCash
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
DECWEB - Internet Fiscal Statement Submission
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
Pool-site E-voting Security
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions - Articles
An Adaptive Authorization Model Based on RBAC
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
Some Results on Algebraic Cryptanalysis of A5/2 Algorithm
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
Image Processing Oriented to Security Optimization
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
WiMAX Security Issues in E-learning Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
Security Engineering and Reengineering on Windows 2008 Server Based Distributed Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
Chess Cryptosystem
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols - Articles
Security in SPGBP – Simulation of Protein Generation Bioinformatic Project
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Integrating e-Payment Services with RIA Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Implementing graphic passwords in Directory Services Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Requirements for Development of an Assessment System for IT&C Security Audit
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Key Recovery for Certification Authorities
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
The Cost Influence on Reliability and Security of the Software Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Design and Implementation of a Cyber-Defense Exercise
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Web Security in University Curricula
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Vulnerability Analysis in Web Distributed Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Cryptographic Applications using FPGA Technology
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
PKI Interoperability Based on Online Certificate Validation
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Web Single Sign-On Implementation Using the SimpleSAMLphp Application
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Interoperability Issues for VPN IPsec Solutions
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Security Issues for 2D Barcodes Ticketing Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security - Articles
AES Encryption and Decryption Using Direct3D 10 API
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security - Articles
Smart Cards Applications in the Healthcare System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security - Articles
Security Issues in Streaming Server for Mobile Devices Development
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security - Articles
Legal and Practical Aspects in the Computer Science Investigation
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security - Articles
Rootkits and Malicious Code Injection
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
Methods and Techniques of Quality Management for ICT Audit Processes
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
Security Survey of Internet Browsers Data Managers
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
Hiding Malicious Content in PDF Documents
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
Information Security Standards
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
OpenID, a Single Sign-On Solution for E-learning Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT - Articles
2D Barcode for DNA Encoding
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
BWS Open System Architecture Security Assessment
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
Security Aspects of Collaborative Banking Systems Applied in Economy
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
Refined Method for Choosing a Security Solution for Mobile Application – Web Service Interactions
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
Project Management with IT Security Focus
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
A Real-Time Face Recognition System Using Eigenfaces
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions - Articles
Techniques of Program Code Obfuscation for Secure Software
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
On the Security of Black-Box Implementation of Visual Secret Sharing Schemes
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
Internet Banking Two-Factor Authentication using Smartphones
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
The Management of Law Firms Using Business Process Management, Document Management and Web Services Integration
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
Methods for Obfuscating Java Programs
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
System for Multicast File Transfer
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
Mobile Remote Control Architecture
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
A Short Resume of Romanian Electronic Passports System - ePASS
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems - Articles
An Alternative Solution to Https for Secure Access to Web Services
Abstract Untitled () PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems - Articles
Self-Healing for Mobile Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems - Articles
Agent-Based Framework for Implementing and Deploying of SOA
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems - Articles
Study on Audit for Distributed Applications: a Proposal for Simplified Audit Module Architecture
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems - Articles
Virtual Enterprises Reach for Cloud Computing
Abstract Untitled () PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
About group digital signatures
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
About the Key Escrow Properties of Identity Based Encryption Schemes
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
Secure Single Sign-On using CAS and OpenID
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
A Study of Implementing an Information Security Management System for Open Source Cloud Computing
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
Securing SIP: An Easy and Effective Solution
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
Live Forensics – Extracting Credentials on Windows and Linux Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security - Articles
Binary Code Disassembly for Reverse Engineering
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security - Articles
Automated Internet Data-mining - IQL
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Automatic Search of Web APIs exposed in the open source context
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Database Versioning, a Transparent SQL Approach
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Electronic Wallet and Access Control Solution Based on RFID MiFare Cards
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Security Principles in ERP Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Practical Issues using Distributed Computing Environments – Apache Hadoop
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing - Articles
Mobile Solution for Digital Signature
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics - Articles
Forecasting Exchange Rates with Mixed Models
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics - Articles
Adaptive Learning Management System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics - Articles
Management of Mobile Web Application Development with Quality Assurance
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics - Articles
M-Health: Use of Mobile Devices in Telemedicine
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics - Articles
The Internet as a Technology and Catalyst for Growth
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security - Articles
WSD Implementation for Processing Improvement of Structured Documents
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security - Articles
Analysis of Zero-Day Vulnerabilities in Java
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security - Articles
Online Digital Trading
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security - Articles
Approaches on Internet of Things Solutions
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
Encryption as a Service using Parallel Computing Frameworks
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
Location/ID Separation Protocol as Solution for Enterprise Networks
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
Security of Mobile Tracking Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
Secure Inter-Process Communication
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
Software Application for Storage Devices Data Protection
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies - Articles
WPA/WPA2 Password Security Testing using Graphics Processing Units
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 3 (2014): Mobile and Cloud Technologies - Articles
Implementing Mobile Applications for Virtual Exhibitions using Augmented Reality
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 2 (2014): Mobile technologies - Articles
Securing Web Services using Service Token Security
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Big Data Issues: Performance, Scalability, Availability
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Cardless Withdrawal System for Mobile Banking Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Protecting Stored Data on Android Devices
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Security Elements in Distributed Mobile Architectures
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Mobile Architecture for Distributed Brute-Force Attacks
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Secure Environment for Internet Browsing
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 1 (2014): Mobile, Web and Security - Articles
Techniques for Finding Vulnerabilities in Web Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 3 (2014): Mobile and Cloud Technologies - Articles
OpenSSL vulnerabilities: the Heartbleed Bug and Cupid
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 3 (2014): Mobile and Cloud Technologies - Articles
Secure management of the Intellectual Property in the Cloud
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 2 (2014): Mobile technologies - Articles
Enabling the Ciphering Indicator on Android
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 2 (2014): Mobile technologies - Articles
Cyber Defense Exercises and their Role in Cyber Warfare
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 2 (2014): Mobile technologies - Articles
Reducing Costs between Sequential Backups
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 3 (2014): Mobile and Cloud Technologies - Articles
Autoimmune Cyber Retaliation Supported by Visual Analytics
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 4 (2014): Internet of Things and Electronic Payments - Articles
IoT – Internet of Things Architecture for Context Aware Sensors Data Processing in Waste Management Solution
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 4 (2014): Internet of Things and Electronic Payments - Articles
PayPal Transactions Security
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 4 (2014): Internet of Things and Electronic Payments - Articles
Multipurpose Platform for Electronic Currency System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 4 (2014): Internet of Things and Electronic Payments - Articles
Security in Electronic Payment Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Risk Assessment Model for Mobile Malware
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Securing SharePoint Server with Windows Azure Multi-Factor Authentication
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Biometric Security - Fingerprint Recognition System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Secure Applications Integration with Apache Camel
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Smart Waste Management using Internet of Things Architecture
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Banking Software Applications Security
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 1 (2015): Current trends in Information Security - Articles
Implementing Security in a Vulnerable CRM
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Software Tools for Source Code Analysis
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Single Page Web Applications Security
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Digital Forensics Capabilities in an Open Source Framework
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Reverse Engineering Malicious Applications
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Analyzing and Specifying Security Requirements in Early Stages of Software Development Life Cycle
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 2 (2015): Software Security - Articles
Securing a REST Web Service
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Security System for Mobile Voting with Biometrics
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Ensuring Privacy in the Android OS by Hooking Methods in Its API
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Anonymous Mobile Payment Solution
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Location-Based Security for Resource Management
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Encryption and Decryption of Messages on Android using NFC Tags
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 7 No. 3 (2015): Mobile Technologies and Solutions - Articles
Security in Service Oriented Architectures – Volatility-Based Hedging Support System
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions - Articles
Facial Recognition using OpenCV
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security - Articles
Homomorphic Encryption Schemes and Applications for a Secure Digital World
Abstract PDF