X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Patent (459) 459
Journal Article (46) 46
Conference Proceeding (41) 41
Book Chapter (40) 40
Book / eBook (9) 9
Web Resource (2) 2
Book Review (1) 1
Magazine Article (1) 1
Publication (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
electric communication technique (424) 424
electricity (424) 424
transmission of digital information, e.g. telegraphiccommunication (395) 395
wireless communications networks (326) 326
physics (70) 70
cryptography (56) 56
advertising (48) 48
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (48) 48
display (48) 48
education (48) 48
seals (48) 48
telephonic communication (45) 45
transmission (31) 31
calculating (28) 28
computing (28) 28
counting (28) 28
electric digital data processing (26) 26
jamming of communication (25) 25
secret communication (25) 25
telecommunications (20) 20
privacy (19) 19
multiplex communication (17) 17
engineering, electrical & electronic (13) 13
computer science (12) 12
global system for mobile communications (11) 11
information storage (11) 11
information storage based on relative movement between recordcarrier and transducer (11) 11
computer science, theory & methods (10) 10
selecting (9) 9
computer science, information systems (7) 7
garbling schemes (7) 7
mobile communication systems (7) 7
pictorial communication, e.g. television (7) 7
3rd generation partnership project (6) 6
evolved packet system (6) 6
homomorphic encryption (6) 6
trust (6) 6
algorithms (5) 5
communication systems (5) 5
computer communication networks (5) 5
computer science - cryptography and security (5) 5
data encryption (5) 5
long-term evolution (5) 5
management of computing and information systems (5) 5
networks (5) 5
secure multiparty computations (5) 5
technology (5) 5
technology & engineering (5) 5
verschlüsselung (5) 5
wireless communication systems (5) 5
adaptive security (4) 4
cloud computing (4) 4
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (4) 4
electronics & communications engineering (4) 4
encryption (4) 4
gsm communications (4) 4
internet (4) 4
mobile & wireless communications (4) 4
mobile communication (4) 4
privacy-enhancing technology (4) 4
private information retrieval (4) 4
protocols (4) 4
radio (4) 4
security measures (4) 4
servers (4) 4
social network services (4) 4
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (4) 4
wireless communication (4) 4
access control (3) 3
auditing (3) 3
authentifizierung (3) 3
cell phone systems (3) 3
channel with failures (3) 3
communities (3) 3
computer networks (3) 3
computer security (3) 3
data privacy (3) 3
directed graph (3) 3
dtn (3) 3
electrical engineering (3) 3
fragmentation (3) 3
heimnetzwerk (3) 3
lte (3) 3
mathematical models (3) 3
mobile ad hoc networks (3) 3
mobilnetz (3) 3
social networks (3) 3
systems and data security (3) 3
telekomunikace (3) 3
trust relation management (3) 3
universal mobile telecommunications system (3) 3
usage control (3) 3
vehicles (3) 3
vehicular communication systems (3) 3
wireless networks (3) 3
3gpp (2) 2
3gpp long-term evolution (2) 2
5.23 (2) 2
5g (2) 2
activity scheduling (2) 2
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (514) 514
French (148) 148
German (97) 97
Chinese (33) 33
Finnish (31) 31
Swedish (31) 31
Portuguese (19) 19
Spanish (13) 13
Danish (7) 7
Korean (5) 5
Polish (3) 3
Russian (2) 2
Czech (1) 1
Greek (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2005, 2nd ed., ISBN 0470011033, 424
Building on the success of the first edition, UMTS Networks second editionallows readers to continue their journey through UMTS up to the latest 3GPP... 
Mobile communication systems | Wireless communication systems | Global system for mobile communications
eBook
Computer Communications, ISSN 0140-3664, 10/2010, Volume 33, Issue 16, p. 1893
Journal Article
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, ISSN 1867-8211, 2018, Volume 211, pp. 403 - 412
Conference Proceeding
Proceedings of the International Conference on web intelligence, 08/2017, pp. 1049 - 1053
The rapid expansion of available online services has raised concerns about user privacy. In the online world, only a minority of users is actually aware where... 
upcv | privacy | collaborative recommender | deniability | book-crossing | token | Privacy | Token | Deniability | Collaborative recommender | Book-crossing | Upcv
Conference Proceeding
2019 25th Conference of Open Innovations Association (FRUCT), ISSN 2305-7254, 11/2019, Volume 622, Issue 25, pp. 15 - 24
Multi SIM User Equipment (UE) can have more than one physical slot for Universal Integrated Circuit Card (UICC). The eUICC is an embedded version of the UICC,... 
uicc | akma | usim | dual sim | multi sim | euicc
Conference Proceeding
08/2017
Subscription privacy of a user has been a historical concern with all the previous generation mobile networks, namely, GSM, UMTS,and LTE. While a little... 
Computer Science - Cryptography and Security
Journal Article
03/2017
The 1st EAI International Conference on 5G for Future Wireless Networks, 5GWN 2017 The aspirations for a 5th generation (5G) mobile network are high. It has a... 
Computer Science - Cryptography and Security
Journal Article
2018 22nd Conference of Open Innovations Association (FRUCT), ISSN 2305-7254, 05/2018, Volume 2018-, Issue 22, pp. 217 - 223
Ahstract- Trust relation in this work refers to permission that is given to a user at source-host to access another user at target-host through an... 
Cloud computing | Privacy | Information retrieval | Protocols | Databases | Public key | Private information retrieval | Shortest path queries | Cryptography | Privacy-enhancing technology | Directed graph
Conference Proceeding
Proceedings of the ACM Symposium on Applied Computing, 2019, Volume 147772, pp. 1867 - 1870
Conference Proceeding
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 02/2018, Volume 2018-, pp. 1 - 5
In this work, a trust relation determines whether a certain user (at source-host) has permission to access another user (at target-host) by utilising an... 
Jacobian matrices | Cloud computing | Protocols | Databases | Reachability matrix | Privacy-enhancing technology | Private information retrieval | Data structures | Trust relation management | Cryptography | Servers | Directed graph
Conference Proceeding
Proceedings of the XXth Conference of Open Innovations Association FRUCT, ISSN 2305-7254, 05/2018, Volume 426, Issue 22, pp. 338 - 343
In 5G, identity privacy of a user is proposed to be protected by concealing the identifier of the user. In order to route the concealed identifier to the... 
Identity Privacy | Identity Based Encryption | Cryptography | Cellular Networks
Journal Article
2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 06/2018, Volume 2018-, pp. 1 - 5
We consider fragmented message transmission through a heterogeneous chain of several independently disrupted communication links. The message is prepared for... 
Wireless communication | Exponential distribution | Conferences | Receivers | Signal processing | data transfer | Electronic mail | channel with failures | Standards | fragmentation | DTN
Conference Proceeding
Journal of Applied Social Psychology, ISSN 0021-9029, 03/2013, Volume 43, Issue 3, pp. 638 - 659
This paper explores trust of mobile applications based on users' behaviors. It proposes a trust behavior construct through principal component analysis,... 
PSYCHOLOGY, SOCIAL | INTERPERSONAL-TRUST | E-COMMERCE | INFORMATION-TECHNOLOGY | SCALE DEVELOPMENT | ONLINE TRUST | PSYCHOLOGICAL-RESEARCH | HUMAN INTERVENTION | SYSTEMS | ACCEPTANCE | MODEL
Journal Article
COMPUTER COMMUNICATIONS, ISSN 0140-3664, 10/2010, Volume 33, Issue 16, pp. 1893 - 1893
Journal Article
03/2019
The present disclosure describes example mobile equipment, network nodes, and related methods. One example mobile equipment comprises a transceiver configured... 
ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | ELECTRICITY
Patent
02/2019
The present disclosure describes example mobile equipment, network nodes, and related methods. One example mobile equipment comprises a transceiver configured... 
ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | ELECTRICITY
Patent
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, ISSN 2324-898X, 11/2011, pp. 9 - 10
Mobile services are increasingly utilizing context information, e.g. user location. There is an intriguing interplay between privacy, identity, security and... 
Context | Privacy | Data privacy | location privacy | Communities | data collection trial | multiparty computations | mobile communications | Mobile communication | Mobile handsets | Monitoring | usage control
Conference Proceeding
01/2019
A method of communication between a first node and a second node for a system where a plurality of different channels is provided between said first and second... 
MULTIPLEX COMMUNICATION | ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | TELEPHONIC COMMUNICATION | ELECTRICITY
Patent
01/2019
The invention relates to a mobile equipment (100) and a network node (500). The mobile equipment (100) comprises a transceiver (102) configured to receive at... 
ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | ELECTRICITY
Patent
09/2018
An identifier containing at least one encrypted part is received at a first network entity. A second network entity may then be determined based on the... 
ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | ELECTRICITY
Patent
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.