Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
Securing Data Privacy on Mobile Devices in Emergency Health Situations 在紧急卫生情况下保护移动设备上的数据隐私
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_13
Kalpana Singh, J. Zhong, V. Mirchandani, L. Batten, P. Bertók
{"title":"Securing Data Privacy on Mobile Devices in Emergency Health Situations","authors":"Kalpana Singh, J. Zhong, V. Mirchandani, L. Batten, P. Bertók","doi":"10.1007/978-3-642-33392-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks 使用提取的行为特征来改善共享路径的隐私
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_12
Mads Schaarup Andersen, M. Kjærgaard, Kaj Grønbæk
{"title":"Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks","authors":"Mads Schaarup Andersen, M. Kjærgaard, Kaj Grønbæk","doi":"10.1007/978-3-642-33392-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
APEFS: An Infrastructure for Permission-Based Filtering of Android Apps APEFS:基于许可的Android应用程序过滤的基础设施
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_1
Simon Meurer, Roland Wismüller
{"title":"APEFS: An Infrastructure for Permission-Based Filtering of Android Apps","authors":"Simon Meurer, Roland Wismüller","doi":"10.1007/978-3-642-33392-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122203116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Private Pooling: A Privacy-Preserving Approach for Mobile Collaborative Sensing 私有池:一种移动协同感知的隐私保护方法
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_5
Kevin Wiesner, M. Dürr, Markus Duchon
{"title":"Private Pooling: A Privacy-Preserving Approach for Mobile Collaborative Sensing","authors":"Kevin Wiesner, M. Dürr, Markus Duchon","doi":"10.1007/978-3-642-30244-2_5","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Agent Based Middleware for Maintaining User Privacy in IPTV Recommender Services IPTV推荐服务中基于代理的用户隐私保护中间件
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_6
Ahmed M. Elmisery, D. Botvich
{"title":"Agent Based Middleware for Maintaining User Privacy in IPTV Recommender Services","authors":"Ahmed M. Elmisery, D. Botvich","doi":"10.1007/978-3-642-30244-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128312161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile Users 一种控制移动用户访问上下文信息的上下文感知隐私策略语言
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_3
A. Behrooz, A. Devlic
{"title":"A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile Users","authors":"A. Behrooz, A. Devlic","doi":"10.1007/978-3-642-30244-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fingerprint Recognition with Embedded Cameras on Mobile Phones 手机内嵌摄像头指纹识别
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_12
M. Derawi, Bian Yang, C. Busch
{"title":"Fingerprint Recognition with Embedded Cameras on Mobile Phones","authors":"M. Derawi, Bian Yang, C. Busch","doi":"10.1007/978-3-642-30244-2_12","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Privacy Enhanced Device Access 隐私增强设备访问
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_7
G. M. Køien
{"title":"Privacy Enhanced Device Access","authors":"G. M. Køien","doi":"10.1007/978-3-642-30244-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobile Security with Location-Aware Role-Based Access Control 移动安全与位置感知基于角色的访问控制
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_15
Nils Ulltveit-Moe, V. Oleshchuk
{"title":"Mobile Security with Location-Aware Role-Based Access Control","authors":"Nils Ulltveit-Moe, V. Oleshchuk","doi":"10.1007/978-3-642-30244-2_15","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_15","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud? 移动云会比传统云更值得信赖吗?
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2011-05-17 DOI: 10.1007/978-3-642-30244-2_11
Mufajjul Ali
{"title":"Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?","authors":"Mufajjul Ali","doi":"10.1007/978-3-642-30244-2_11","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信