Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
Program Structure-Based Feature Selection for Android Malware Analysis 基于程序结构的Android恶意软件特征选择
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_5
Andrew Walenstein, Luke Deshotels, Arun Lakhotia
{"title":"Program Structure-Based Feature Selection for Android Malware Analysis","authors":"Andrew Walenstein, Luke Deshotels, Arun Lakhotia","doi":"10.1007/978-3-642-33392-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Claim-Based versus Network-Based Identity Management: A Hybrid Approach 基于声明的身份管理与基于网络的身份管理:一种混合方法
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_4
Faysal Boukayoua, Jan Vossaert, B. Decker, Vincent Naessens
{"title":"Claim-Based versus Network-Based Identity Management: A Hybrid Approach","authors":"Faysal Boukayoua, Jan Vossaert, B. Decker, Vincent Naessens","doi":"10.1007/978-3-642-33392-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments 商业环境中智能移动设备的上下文感知、数据驱动策略实施
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_9
Denis Feth, Christian Jung
{"title":"Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments","authors":"Denis Feth, Christian Jung","doi":"10.1007/978-3-642-33392-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Scalable Trust Assessment and Remediation of Wireless Devices 无线设备的可扩展信任评估和修复
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_7
Andreas Leicher, A. Schmidt, Yogendra Shah
{"title":"Scalable Trust Assessment and Remediation of Wireless Devices","authors":"Andreas Leicher, A. Schmidt, Yogendra Shah","doi":"10.1007/978-3-642-33392-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments 介绍巴西项目TSAM -移动环境的安全技术
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_6
A. Braga, Erick N. Nascimento, Lucas R. Palma
{"title":"Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments","authors":"A. Braga, Erick N. Nascimento, Lucas R. Palma","doi":"10.1007/978-3-642-33392-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing PEPPeR:用于参与式感知的查询者隐私增强协议
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_11
T. Dimitriou, Ioannis Krontiris, Ahmad Sabouri
{"title":"PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing","authors":"T. Dimitriou, Ioannis Krontiris, Ahmad Sabouri","doi":"10.1007/978-3-642-33392-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Verifying the Location of a Mobile Device User 验证移动设备用户的位置
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_8
Jack Brassil, P. Manadhata
{"title":"Verifying the Location of a Mobile Device User","authors":"Jack Brassil, P. Manadhata","doi":"10.1007/978-3-642-33392-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Smart Card Reader Using NFC-Enabled Smartphones 使用nfc功能的智能手机的移动智能卡读卡器
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_3
F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich
{"title":"Mobile Smart Card Reader Using NFC-Enabled Smartphones","authors":"F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich","doi":"10.1007/978-3-642-33392-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Securing Mobile Device-Based Machine Interactions with User Location Histories 保护基于移动设备的机器与用户位置历史的交互
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_10
Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien
{"title":"Securing Mobile Device-Based Machine Interactions with User Location Histories","authors":"Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien","doi":"10.1007/978-3-642-33392-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Guidance Model for Architecting Secure Mobile Applications 构建安全移动应用程序的指导模型
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_2
Widura Schwittek, André Diermann, S. Eicker
{"title":"A Guidance Model for Architecting Secure Mobile Applications","authors":"Widura Schwittek, André Diermann, S. Eicker","doi":"10.1007/978-3-642-33392-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信