Skip to search formSkip to main contentSkip to account menu

Security modes

Known as: Dedicated Security Mode 
Generally, Security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
History is an enquiry about the actions of human being that have done in the past. The subject matter of history is not the past… 
2018
2018
Este artigo apresenta uma pesquisa sobre os principais problemas de segurança que afetam os protocolos de comunicação no contexto… 
2017
2017
Smartphones are becoming ubiquitous and we use them for different types of tasks. One problem of using the same device for… 
2016
2016
Smartphones have become an integral part of our daily life. Businesses now offer services through smartphones. Users also store… 
2013
2013
The CoAP draft defines how to use DTLS as security mechanism. In order to establish which nodes are trusted to initiate a DTLS… 
2012
2012
The availability of inexpensive sensing devices capable of wireless communications enables the design of exciting and new… 
Review
2009
Review
2009
Bluetooth is one of the most widely available wireless technologies with over 2 billion Bluetooth-enabled devices shipped. Used… 
2003
2003
The Agent-Based Environment for Linking Simulations (ABELS) framework is designed to allow physically distributed simulations and… 
Review
2003
Review
2003
This article discusses postpregnancy programs that include family planning. Empirical evidence suggests that postpartum care is…