1–4 of 4 hits
|

Your search:
keywords:(security application)

    The Design of Car Networking Based on WiMax and Zigbee Technology

    Yuan, Hong-Wei / Song, Qi-Wen | Tema Archive | 2011
    Keywords: Security-Anwendung , commercial application

    Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby)

    Froscher, J.N. / McDermott, J.P. / Payne, C.N. et al. | Tema Archive | 1990
    Keywords: CERTIFIABLE APPLICATION SYSTEMS , SECURITY REQUIREMENTS

    A methodology for defining application-specific security requirements for C3 systems

    Creps, R.E. | Tema Archive | 1989
    Keywords: SECURITY POLICIES , APPLICATION-SPECIFIC SECURITY REQUIREMENTS , POTENTIAL SECURITY RISKS , SECURITY REQUIREMENTS DEFINITION METHODOLOGY , SECURITY REQUIREMENTS SPECIFICATION LANGUAGE

    DATAMOVIL: a practical implementation of TRADAMO mobile data transmission protocol

    Bustillo, J. / Gonzales, P. / Jaquotot, J. et al. | Tema Archive | 1989
    Keywords: SECURITY FORCES , APPLICATION-SPECIFIC INTEGRATED CIRCUIT