1–6 of 6 hits
|

Your search:
keywords:(security application)

    A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN

    Woo, Samuel | Online Contents | 2015
    Keywords: security protocol , Security , Network security , in-vehicle network security , smartphone application , Communication system security

    The Design of Car Networking Based on WiMax and Zigbee Technology

    Yuan, Hong-Wei / Song, Qi-Wen | Tema Archive | 2011
    Keywords: Security-Anwendung , commercial application

    On the detection of individuals and vehicles on an airport's apron

    Antequera, J.A. / Kampel, M. | IET Digital Library Archive | 2005
    Keywords: outdoor application , security

    Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby)

    Froscher, J.N. / McDermott, J.P. / Payne, C.N. et al. | Tema Archive | 1990
    Keywords: CERTIFIABLE APPLICATION SYSTEMS , SECURITY REQUIREMENTS

    A methodology for defining application-specific security requirements for C3 systems

    Creps, R.E. | Tema Archive | 1989
    Keywords: SECURITY POLICIES , APPLICATION-SPECIFIC SECURITY REQUIREMENTS , POTENTIAL SECURITY RISKS , SECURITY REQUIREMENTS DEFINITION METHODOLOGY , SECURITY REQUIREMENTS SPECIFICATION LANGUAGE

    DATAMOVIL: a practical implementation of TRADAMO mobile data transmission protocol

    Bustillo, J. / Gonzales, P. / Jaquotot, J. et al. | Tema Archive | 1989
    Keywords: SECURITY FORCES , APPLICATION-SPECIFIC INTEGRATED CIRCUIT