{"title":"An Introduction to Various Privacy Models","authors":"X. Lu, M. Au","doi":"10.1016/B978-0-12-804629-6.00011-0","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00011-0","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps","authors":"J. Walls, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-804629-6.00008-0","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00008-0","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dennis Y. W. Liu, Guozhi Xue, Yi Xie, Xiapu Luo, M. Au
{"title":"Performance of Digital Signature Schemes on Mobile Devices","authors":"Dennis Y. W. Liu, Guozhi Xue, Yi Xie, Xiapu Luo, M. Au","doi":"10.1016/B978-0-12-804629-6.00012-2","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00012-2","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RESTful IoT Authentication Protocols","authors":"Hoai Viet Nguyen, Luigi Lo Iacono","doi":"10.1016/B978-0-12-804629-6.00010-9","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00010-9","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116602955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chia, Kim-Kwang Raymond Choo, Dennis D. Fehrenbacher
{"title":"How Cyber-Savvy are Older Mobile Device Users?","authors":"C. Chia, Kim-Kwang Raymond Choo, Dennis D. Fehrenbacher","doi":"10.1016/B978-0-12-804629-6.00004-3","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00004-3","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116922810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness","authors":"F. Schiliro, Kim-Kwang Raymond Choo","doi":"10.1016/b978-0-12-804629-6.00005-5","DOIUrl":"https://doi.org/10.1016/b978-0-12-804629-6.00005-5","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Security: Mobile Security: End Users are the Weakest Link in the System","authors":"L. Lau","doi":"10.1016/B978-0-12-804629-6.00003-1","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00003-1","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126533952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Security and Privacy","authors":"Man Ho Au, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-804629-6.00001-8","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00001-8","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Security: A Practitioner's Perspective","authors":"S. Tully, Y. Mohanraj","doi":"10.1016/B978-0-12-804629-6.00002-X","DOIUrl":"https://doi.org/10.1016/B978-0-12-804629-6.00002-X","url":null,"abstract":"","PeriodicalId":162459,"journal":{"name":"Mobile Security and Privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}