Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_8
M. Marcu, D. Tudor
{"title":"Energy Efficiency Measurements of Mobile Virtualization Systems","authors":"M. Marcu, D. Tudor","doi":"10.1007/978-3-642-30244-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_4
Clemens Orthacker, Peter Teufl, Stefan Kraxberger, G. Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber
{"title":"Android Security Permissions - Can We Trust Them?","authors":"Clemens Orthacker, Peter Teufl, Stefan Kraxberger, G. Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber","doi":"10.1007/978-3-642-30244-2_4","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125663899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_13
A. Gopalan, V. Gowadia, E. Scalavino, Emil C. Lupu
{"title":"Policy Driven Remote Attestation","authors":"A. Gopalan, V. Gowadia, E. Scalavino, Emil C. Lupu","doi":"10.1007/978-3-642-30244-2_13","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_10
Abu Shohel Ahmed, Peeter Laud
{"title":"Formal Security Analysis of OpenID with GBA Protocol","authors":"Abu Shohel Ahmed, Peeter Laud","doi":"10.1007/978-3-642-30244-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_1
Peter Teufl, Stefan Kraxberger, Clemens Orthacker, G. Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber
{"title":"Android Market Analysis with Activation Patterns","authors":"Peter Teufl, Stefan Kraxberger, Clemens Orthacker, G. Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber","doi":"10.1007/978-3-642-30244-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122910273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_14
J. Kar
{"title":"ID-Based Deniable Authentication Protocol Suitable for Mobile Devices","authors":"J. Kar","doi":"10.1007/978-3-642-30244-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_14","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_2
Yuan Niu, Hao Chen
{"title":"Gesture Authentication with Touch Input for Mobile Devices","authors":"Yuan Niu, Hao Chen","doi":"10.1007/978-3-642-30244-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123852677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-17DOI: 10.1007/978-3-642-30244-2_9
Roberto Maurizio Pellegrini, S. Persia, S. Betti
{"title":"Digital Holography for Security Applications","authors":"Roberto Maurizio Pellegrini, S. Persia, S. Betti","doi":"10.1007/978-3-642-30244-2_9","DOIUrl":"https://doi.org/10.1007/978-3-642-30244-2_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133823991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_13
D. Fuentes, Juan Antonio Álvarez-García, J. Ortega, L. G. Abril, Fran Morente
{"title":"Event-Based Method for Detecting Trojan Horses in Mobile Devices","authors":"D. Fuentes, Juan Antonio Álvarez-García, J. Ortega, L. G. Abril, Fran Morente","doi":"10.1007/978-3-642-17502-2_13","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_4
P. Verhaeghe, K. Verslype, Jorn Lapon, Vincent Naessens, B. Decker
{"title":"A Mobile and Reliable Anonymous ePoll Infrastructure","authors":"P. Verhaeghe, K. Verslype, Jorn Lapon, Vincent Naessens, B. Decker","doi":"10.1007/978-3-642-17502-2_4","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}