SOFTWARE SECURITY OVERVIEW

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Threats and Security Software Solutions for Smartphones

The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...

متن کامل

Software Security and Security Software

mation security models or the fundamental building blocks used to create them. (A good example of this is “When Hashes Collide,” the first installment of the magazine’s newest department, Crypto Corner. Yet, we rarely read about security technology’s strengths and weaknesses in the specific hardware and software products used in real-world environments. Isn’t it curious that almost no published...

متن کامل

Wireless Security: An Overview

The physical transport methods used in wireless communication differ from wired communication. These differences affect how a secure channel can be established in a wireless environment. The purpose of this tutorial is to provide an overview of how a secure channel is set up in a wireless environment that uses the 802.11 or WAP standards.

متن کامل

Security Overview of Bluetooth

In this paper, we give a short overview of the security architecture of Bluetooth. We will especially focus on the key exchange protocol in Bluetooth. This is the most important security critical part of the security architecture. Unfortunately, there are a lot of security flaws in the Bluetooth standard. Some are rather theoretical, but most of the problems can be exploited by an attacker. An ...

متن کامل

Wireless Security Design Overview

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Системи управління, навігації та зв’язку. Збірник наукових праць

سال: 2019

ISSN: 2073-7394

DOI: 10.26906/sunz.2019.2.055