Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_5
Andrew Walenstein, Luke Deshotels, Arun Lakhotia
{"title":"Program Structure-Based Feature Selection for Android Malware Analysis","authors":"Andrew Walenstein, Luke Deshotels, Arun Lakhotia","doi":"10.1007/978-3-642-33392-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_4
Faysal Boukayoua, Jan Vossaert, B. Decker, Vincent Naessens
{"title":"Claim-Based versus Network-Based Identity Management: A Hybrid Approach","authors":"Faysal Boukayoua, Jan Vossaert, B. Decker, Vincent Naessens","doi":"10.1007/978-3-642-33392-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_9
Denis Feth, Christian Jung
{"title":"Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments","authors":"Denis Feth, Christian Jung","doi":"10.1007/978-3-642-33392-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_7
Andreas Leicher, A. Schmidt, Yogendra Shah
{"title":"Scalable Trust Assessment and Remediation of Wireless Devices","authors":"Andreas Leicher, A. Schmidt, Yogendra Shah","doi":"10.1007/978-3-642-33392-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_6
A. Braga, Erick N. Nascimento, Lucas R. Palma
{"title":"Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments","authors":"A. Braga, Erick N. Nascimento, Lucas R. Palma","doi":"10.1007/978-3-642-33392-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_11
T. Dimitriou, Ioannis Krontiris, Ahmad Sabouri
{"title":"PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing","authors":"T. Dimitriou, Ioannis Krontiris, Ahmad Sabouri","doi":"10.1007/978-3-642-33392-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_8
Jack Brassil, P. Manadhata
{"title":"Verifying the Location of a Mobile Device User","authors":"Jack Brassil, P. Manadhata","doi":"10.1007/978-3-642-33392-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_3
F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich
{"title":"Mobile Smart Card Reader Using NFC-Enabled Smartphones","authors":"F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich","doi":"10.1007/978-3-642-33392-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_10
Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien
{"title":"Securing Mobile Device-Based Machine Interactions with User Location Histories","authors":"Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien","doi":"10.1007/978-3-642-33392-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-25DOI: 10.1007/978-3-642-33392-7_2
Widura Schwittek, André Diermann, S. Eicker
{"title":"A Guidance Model for Architecting Secure Mobile Applications","authors":"Widura Schwittek, André Diermann, S. Eicker","doi":"10.1007/978-3-642-33392-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}