This book provides a state-of-the-art account of corporate blogs as a new form of corporate communication studied from corpus-based and discourse perspectives. Using a range of …
J Horsch, K Böttinger, M Weiß, S Wessel… - Proceedings of the 4th …, 2014 - dl.acm.org
Identity theft has deep impacts in today's mobile ubiquitous environments. At the same time, digital identities are usually still protected by simple passwords or other insufficient security …
More and more online services require user identification. This increases time to fill out extensive forms and results in large amounts of login and identification data to remember. At …
MH Samadani, M Shajari - … Conference, FGIT 2010, Jeju Island, Korea …, 2010 - Springer
Due to the personal nature of a mobile device, it is seen as a suitable medium for storing personal information and credentials. As a result, the mobile device becomes the owner's …
K Hyppönen, M Hassinen, E Trichina - ISSE 2008 Securing Electronic …, 2009 - Springer
Abstract Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We …
Durch die zunehmende Vernetzung der Gesellschaft gewinnt die mobile Internetnutzung und damit der Wunsch, sich sicher mobil authentisieren zu können, immer mehr an …
The amount of sensitive information stored in different online services is rapidly growing in traditional web applications and also in mobile services. Most of these services control their …
K Hyppónen, M Hassinen… - ISSE 2008 Securing …, 2009 - books.google.com
Abstract Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We …