2016 Sixth International Conference on Innovative Computing Technology (INTECH) 2016
DOI: 10.1109/intech.2016.7845101
|View full text |Cite
|
Sign up to set email alerts
|

SCEAMS: Secure corporate environment adhered to mobile & smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…This meticulous data recording and secure access system ensures transparency, accountability, and reliability throughout the entire shipment process. Mobile security of different mobiles and business applications can also be ensured through different suggestions and recommendations, such as MVP, app right management, and inspection (antivirus McAfee, CLAMAV, Bit Defender) [37]. Algorithm 4 lays out the detailed functionality of the proposed model that clearly describes the functions of different elements of the solution.…”
Section: Proposed Modelmentioning
confidence: 99%
“…This meticulous data recording and secure access system ensures transparency, accountability, and reliability throughout the entire shipment process. Mobile security of different mobiles and business applications can also be ensured through different suggestions and recommendations, such as MVP, app right management, and inspection (antivirus McAfee, CLAMAV, Bit Defender) [37]. Algorithm 4 lays out the detailed functionality of the proposed model that clearly describes the functions of different elements of the solution.…”
Section: Proposed Modelmentioning
confidence: 99%
“…Attacks like spoofing, dropping of routing traffic, selective forwarding, resource consumption are also important to be mentioned here [6], [7], [8], [9], [10], [11]. Besides this, the safe use of wireless devices like mobiles and smart-phones has been well discussed in [13]. All the attacks mentioned above are equally significant, but, the wormhole is one of the trickiest attacks observed in the literature [12].…”
Section: Introductionmentioning
confidence: 99%