Part 9: Usable SecurityInternational audienceThe loss of control over a new-generation mobile device (e.g. loss of device or short time of inattention) can have negative impacts on the owner’s privacy due to the increasing number of privacy-sensitive data stored on such devices. Current mobile platforms either lack the required protection mechanisms or the implementations lack a balance between the level of security and usability. In order to fill this gap, we propose a design for a local security mechanism for mobile devices by using an reasonable combination of existing technologies
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
This research was conducted to bridge the gap between the purchase and deployment of mobile devices ...
This research analyses the various security mechanism for both personal and corporate users and how ...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
Mobile platforms, such as Android, iOS, and Windows, are gaining more and more relevance within end ...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
The use of mobile devices in business is increasing as employees use them for communications, creati...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
In this paper, provides an overview of some major works that focus on the use of adaptive security f...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
Including mobile environment, conventional security mechanisms have been adapted to satisfy the need...
Mobile devices are used everywhere, from making acall to store huge volume of information. But toget...
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...
In last 3-4 years use of advanced mobile devices such as PDA and smartphone has become a regular pra...
This research was conducted to bridge the gap between the purchase and deployment of mobile devices ...
This research analyses the various security mechanism for both personal and corporate users and how ...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
Mobile platforms, such as Android, iOS, and Windows, are gaining more and more relevance within end ...
In last couple of years use of advanced mobile devices such as PDA and smartphone has become a regul...
The use of mobile devices in business is increasing as employees use them for communications, creati...
Mobile device utilization continues to experience considerable growth and the privacy and security o...
In this paper, provides an overview of some major works that focus on the use of adaptive security f...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informa...
Including mobile environment, conventional security mechanisms have been adapted to satisfy the need...
Mobile devices are used everywhere, from making acall to store huge volume of information. But toget...
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
This paper is concerned with arising problems on security and privacy of personal data on mobile dev...