In some countries, international mobile equipment identities (IMEIs) to be blacklisted, thus blocking access to the mobile network, or to be allowed (whitelisted) by the mobile network operators (MNOs), may be provided by a telecom authority or law enforcement agency (LEA) via...
Over 40 recipes to master mobile device penetration testing with open source tools About This Book • Learn application exploitation for popular mobile platforms • Improve the current security level for mobile platforms and applications • Discover tricks of the trade with...
This Recommendation identifies challenges and proposes mechanisms to enable the detection of mobile devices with duplicate identifiers present on operator networks, as well as recommending mechanisms for validating the legitimacy of such devices.
This Recommendation contains the reference framework and requirements that should be considered when deploying solutions to combat the use of stolen Mobile Devices.
IEC TR 63239:2020 presents the surveyed technologies, product development trends, international standards, and regulation trends of RF beam WPT. This report can be used for the research and analysis of projects that apply small-output remote WPT to mobile devices, such as smartphones,...
This Technical Report presents the surveyed technologies, product development trends, international standards, and regulation trends of RF beam WPT. This report can be used for the research and analysis of projects that apply small-output remote WPT to mobile devices, such as...
The scope of this Standard is to specify a base level of Mobile Device Behavior for supporting Real Time Text (RTT) capabilities when accessing Voice over Long Term Evolution (VoLTE) networks1. The Standard includes the minimum behavior of the mobile device needed for...
This document is a profile that provides requirements for testing biometric presentation attack detection (PAD) mechanisms on mobile devices with local biometric recognition. This document lists requirements from ISO/IEC 30107‑3 specific to mobile devices. It also...
This document is a profile that provides requirements for testing biometric presentation attack detection (PAD) mechanisms on mobile devices with local biometric recognition. This document lists requirements from ISO/IEC 30107-3 specific to mobile devices. It also...
This document provides guidance for performance testing of biometrics when this technology is used on mobile devices with local biometric authentication to improve authentication assurance. This document aims to: - Provide guidance for affordable and cost-efficient testing and...
This document provides guidance for performance testing of biometrics when this technology is used on mobile devices with local biometric authentication to improve authentication assurance. This document aims to: - Provide guidance for affordable and cost-efficient testing and...
This Technical Report provides guidance for developing a consistent and secure method of biometric (either alone or supported by non-biometric) personalization and authentication in a mobile environment for systems procured on the open market. Guidance is provided for - 1:1 verification or...
A step-by-step tutorial covering the specifics of mobile development management with a flurry of relevant screenshots for better understanding and practical learning. This book is for professionals who want to familiarize themselves with mobile device management and who aspire...