-
1
-
-
0346920445
-
-
IETF, RFC2637, July
-
K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, "Pointto-Point Tunneling Protocol (PPTP)," IETF, RFC2637, July 1999.
-
(1999)
Pointto-Point Tunneling Protocol (PPTP)
-
-
Hamzeh, K.1
Pall, G.2
Verthein, W.3
Taarud, J.4
Little, W.5
Zorn, G.6
-
3
-
-
84987991930
-
-
Security Response Publications
-
Security Response Publications, "2015 Internet Security Threat Report, Volume 20 (ISTR20)"(online), available from https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932 GAinternet-security-threat-report-volume-20-2015-social v2.pdf(accessed 2016-04-11)
-
2015 Internet Security Threat Report, Volume 20 (ISTR20)
-
-
-
4
-
-
84991795894
-
-
Symantec Corporation
-
Symantec Corporation, https://www.symantec.com/index.jsp
-
-
-
-
5
-
-
84555190193
-
A comparative privacy analysis of geosocial networks
-
New York, NY, USA
-
Sbastien Gambs, Olivier Heen, and Christophe Potin, "A comparative privacy analysis of geosocial networks," In Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '11), 2011, New York, NY, USA, 33-40.
-
(2011)
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '11)
, pp. 33-40
-
-
Gambs, S.1
Heen, O.2
Potin, C.3
-
6
-
-
84891910662
-
Using location based encryption to improve the security of data access in cloud computing
-
22-25 Aug.
-
Abolghasemi, M.S.; Sefidab, M.M.; Atani, R.E., "Using location based encryption to improve the security of data access in cloud computing," International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.261-265, 22-25 Aug. 2013
-
(2013)
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
, pp. 261-265
-
-
Abolghasemi, M.S.1
Sefidab, M.M.2
Atani, R.E.3
-
7
-
-
80051525439
-
Geo-encryption - A new direction to secure traditional ssl vpn
-
Las Vegas, NV
-
S. V. Limkar, R. K. Jha, S. Pimpalkar and S. Darade, "Geo-Encryption-A New Direction to Secure Traditional SSL VPN," 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 1070-1071, Las Vegas, NV, 2011.
-
(2011)
2011 Eighth International Conference on Information Technology: New Generations (ITNG)
, pp. 1070-1071
-
-
Limkar, S.V.1
Jha, R.K.2
Pimpalkar, S.3
Darade, S.4
-
8
-
-
84991747864
-
-
Google Maps(accessed 2016-04-15)
-
Google Maps.,"SEE WHAT WE'RE UP TO," (online) available from https://www.google.com/intl/en/maps/about/ (accessed 2016-04-15).
-
SEE WHAT we'Re UP to
-
-
-
9
-
-
84871923393
-
-
National Marine Electronics Association(access 2015-12-22)
-
National Marine Electronics Association, "NMEA 0183 Standard" (online), available from http://www.nmea.org/content/nmea standards/nmea 0183 v 410.asp (access 2015-12-22)
-
NMEA 0183 Standard
-
-
-
11
-
-
84991832276
-
-
GlobalSat WorldCom Corporation
-
GlobalSat WorldCom Corporation, "Bu-353S4 Cable GPS with USB interface (SiRF Star IV)" (online), available from http://www.globalsat.com.tw/products-page new.php menu=2&gs en product id=2&gs en product cnt id=77
-
Bu-353S4 Cable GPS with USB Interface (SiRF Star IV)
-
-
-
12
-
-
84904989949
-
Multi-test detection and protection algorithm against spoofing attacks on gnss receivers
-
5-8 May
-
Jovanovic, A.; Botteron, C.; Farine, P.-A., "Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers," IEEE/ION in Position, Location and Navigation Symposium-PLANS 2014, pp.1258-1271, 5-8 May 2014
-
(2014)
IEEE/ION in Position, Location and Navigation Symposium-PLANS 2014
, pp. 1258-1271
-
-
Jovanovic, A.1
Botteron, C.2
Farine, P.-A.3
|