Showing 21 - 40 results of 115 for search 'Mobile computing Security features.', query time: 0.13s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25

    A hybrid super learner ensemble for phishing detection on mobile devices by Routhu Srinivasa Rao, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Bumshik Lee

    Published 2025-05-01
    “…Furthermore, many of these techniques are unsuitable for mobile devices, which face additional constraints, such as limited RAM, smaller screen sizes, and lower computational power. …”
    Get full text
    Article
  6. 26
  7. 27
  8. 28

    Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices by Md Saiful Islam

    Published 2015-06-01
    “…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. This feature could be computed and transmitted efficiently using mobile computing devices. …”
    Get full text
    Article
  9. 29

    Lightweight Interpretable Deep Learning Model for Nutrient Analysis in Mobile Health Applications by Zvinodashe Revesai, Okuthe P. Kogeda

    Published 2025-06-01
    “…Current mobile nutrient analysis applications face critical limitations: sophisticated deep learning models require substantial computational resources unsuitable for budget devices, while lightweight solutions sacrifice accuracy and lack interpretability necessary for user trust. …”
    Get full text
    Article
  10. 30

    Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism by Nothile C. Masango, Jeffrey O. Agushaka, Mercy C. Amaefule, Olutosin Taiwo, Peiying Zhang, Absalom E. Ezugwu, Kashif Saleem, Aseel Smerat, Laith Abualigah

    Published 2025-03-01
    “…Abstract Data security in mobile environments has become a critical concern, driven by the growing demand for mobile services and the proliferation of data-intensive applications such as online gaming, virtual reality, and augmented reality. …”
    Get full text
    Article
  11. 31

    A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network by Huy Anh Bui, Thi Thoa Mac, Xuan Thuan Nguyen

    Published 2025-05-01
    “…Nowadays, mobile robots are applied in a variety of fields to assist humans in doing complicated work such as disaster situations, rescue missions, security and tracking systems, military campaigns, and planetary discovery. …”
    Get full text
    Article
  12. 32

    Lightweight and Security-Enhanced Key Agreement Protocol Using PUF for IoD Environments by Sangjun Lee, Seunghwan Son, Youngho Park

    Published 2025-06-01
    “…Furthermore, this work demonstrates that the proposed protocol offers better performance and security by comparing the computational and communication costs and security features with those of relevant protocols.…”
    Get full text
    Article
  13. 33

    Pre-authentication and group management based secure handover for space-earth integration network by Jia-nan HONG, Shao-hua LI, Kai-ping XUE, Pei-lin HONG

    Published 2016-07-01
    “…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
    Get full text
    Article
  14. 34

    Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine by Eman Daraghmi, Ahmed Hamoudi, Mamoun Abu Helou

    Published 2024-10-01
    “…Developed to support the existing voting system in the state of Palestine, VoteChain aims to provide secure e-voting with features such as auditability, verifiability, accuracy, privacy, flexibility, transparency, mobility, availability, convenience, data integrity, and distribution of authority. …”
    Get full text
    Article
  15. 35
  16. 36

    Mobile-Commerce Usage Challenges among University Students in Uganda: A Case of Kabale University. by Phelix, Businge Mbabazi, Micheal, Tamale, Patricia, Kyomugisha

    Published 2020
    “…The results further showed that music, gaming and banking were most frequently accessed mobile services online however Cost of maintaining operating Internet, Preference for 'feel and touch' features of products, Security Challenges, Slow speed of the Internet, Lack of Credit Cards and Payment Systems were cited among the key challenges though skilled manpower was not a challenge to students. …”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40