-
1
-
-
57349103726
-
-
ALVES, T., AND FELTON, D. TrustZone: Integrated hardware and software security, July 2004. ARM Report.
-
ALVES, T., AND FELTON, D. TrustZone: Integrated hardware and software security, July 2004. ARM Report.
-
-
-
-
3
-
-
85016047463
-
Security policies
-
Academic Press
-
ANDERSON, R., STAJANO, F., AND LEE, J.-H. Security policies. In Advances in Computers, Vol. 55 (2001), Academic Press.
-
(2001)
Advances in Computers
, vol.55
-
-
ANDERSON, R.1
STAJANO, F.2
LEE, J.-H.3
-
4
-
-
34548344520
-
-
ANTI-PHISHING WORKING GROUP APWG, June 2005
-
ANTI-PHISHING WORKING GROUP (APWG). Phishing activity trends report, June 2005. http://antiphishing.org/.
-
Phishing activity trends report
-
-
-
5
-
-
57349136070
-
-
ANTI-PHISHING WORKING GROUP (APWG) expands online identity theft charter. Aug. 3rd 2005 edition of Business Wire. Available: http://www.businesswire.com/ .
-
ANTI-PHISHING WORKING GROUP (APWG) expands online identity theft charter. Aug. 3rd 2005 edition of Business Wire. Available: http://www.businesswire.com/ .
-
-
-
-
8
-
-
57349136402
-
-
BLUETOOTH SPECIFICATION VERSION 1.1. Available at: http://www.bluetooth. com/.
-
BLUETOOTH SPECIFICATION VERSION 1.1. Available at: http://www.bluetooth. com/.
-
-
-
-
9
-
-
20344385400
-
-
O'Reilly
-
BOSWELL, D., KING, B., OESCHGER, I., COLLINS, P., AND MURPHY, E. Creating Applications with Mozilla. O'Reilly, 2002.
-
(2002)
Creating Applications with Mozilla
-
-
BOSWELL, D.1
KING, B.2
OESCHGER, I.3
COLLINS, P.4
MURPHY, E.5
-
12
-
-
57349089870
-
The TLS protocol, IETF Network Working Group RFC 2246
-
January
-
DIERKS, T." The TLS protocol", IETF Network Working Group RFC 2246, January 1999.
-
(1999)
-
-
DIERKS, T.1
-
14
-
-
46449133585
-
Towards Trustworthy Kiosk Computing
-
GARRISS, S., CACERES, R, BERGER, S., SAILER, R., VAN DOORN, L., & ZHANG, X., "Towards Trustworthy Kiosk Computing", Proc. of IEEE HotMobile 2007
-
(2007)
Proc. of IEEE HotMobile
-
-
GARRISS, S.1
CACERES, R.2
BERGER, S.3
SAILER, R.4
VAN DOORN, L.5
ZHANG, X.6
-
17
-
-
57349150528
-
-
KAMADA, T. Compact HTML for small information appliances, 1998. W3CNote: Available: http://www.w3.org/TR/1998/NOTEcopactHTML19980209/
-
KAMADA, T. Compact HTML for small information appliances, 1998. W3CNote: Available: http://www.w3.org/TR/1998/NOTEcopactHTML19980209/
-
-
-
-
18
-
-
57349131959
-
-
LECLAIRE, J. Pharming and SPIM plaguing Internet. 4th June 2005. TechNewsWorld. At http://www.technewsworld.com/story/news/42054.html.
-
LECLAIRE, J. Pharming and SPIM plaguing Internet. 4th June 2005. TechNewsWorld. At http://www.technewsworld.com/story/news/42054.html.
-
-
-
-
19
-
-
57349118794
-
-
LEYDEN, J. UK police issue vicious Trojan alert. 13th August 2004. The Register. Available from http://www.theregister.co.uk/2004/08/13/ trojan phish/.
-
LEYDEN, J. UK police issue "vicious" Trojan alert. 13th August 2004. The Register. Available from http://www.theregister.co.uk/2004/08/13/ trojan phish/.
-
-
-
-
20
-
-
85077302433
-
-
McCUNE, J., PERRIG, A., REITER, M. Bump in the ether: a framework for securing sensitive user input. In Proceedings of USENIX 2006. USENIX Association.
-
McCUNE, J., PERRIG, A., REITER, M. Bump in the ether: a framework for securing sensitive user input. In Proceedings of USENIX 2006. USENIX Association.
-
-
-
-
21
-
-
0041386047
-
Using handhelds and PCs together
-
MYERS, B. A. Using handhelds and PCs together. Communication of the ACM 44, 11 (2001), pp34-41.
-
(2001)
Communication of the ACM
, vol.44
, Issue.11
, pp. 34-41
-
-
MYERS, B.A.1
-
22
-
-
57349184895
-
-
NARAYANASWAMI, C., RAGHUNATH, M. T., KAMIJOH, N., AND INOUE, T. What would you do with 100 MIPS on your wrist? Tech. Rep. RC 22057 (98634), IBM Research, January 2001.
-
NARAYANASWAMI, C., RAGHUNATH, M. T., KAMIJOH, N., AND INOUE, T. What would you do with 100 MIPS on your wrist? Tech. Rep. RC 22057 (98634), IBM Research, January 2001.
-
-
-
-
23
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
Available at
-
OPREA, A., BALFANZ, D., DURFEE, G., AND SMETTERS, D. Securing a remote terminal application with a mobile trusted device. In Proceedings of ACSA 2004. Available at: http://www.acsa-admin.org/.
-
(2004)
Proceedings of ACSA
-
-
OPREA, A.1
BALFANZ, D.2
DURFEE, G.3
SMETTERS, D.4
-
25
-
-
0141494334
-
Fostering a symbiotic handheld environment
-
RAGHUNATH, M., NARAYANASWAMI, C., AND PINHANEZ, C. Fostering a symbiotic handheld environment. Computer 36, 9 (2003), pp56-65.
-
(2003)
Computer
, vol.36
, Issue.9
, pp. 56-65
-
-
RAGHUNATH, M.1
NARAYANASWAMI, C.2
PINHANEZ, C.3
-
26
-
-
84863469085
-
Stronger password authentication using browser extensions
-
USENIX association
-
ROSS, B., JACKSON, C., MIYAKE, N., BONEH, D., AND MITCHELL, J. C. Stronger password authentication using browser extensions. In Proc. of the USENIX Security Symposium (2005), USENIX association.
-
(2005)
Proc. of the USENIX Security Symposium
-
-
ROSS, B.1
JACKSON, C.2
MIYAKE, N.3
BONEH, D.4
MITCHELL, J.C.5
-
27
-
-
0036785515
-
-
ROSS, S. J., HILL, J. L., CHEN, M. Y., JOSEPH, A. D., CULLER, D. E., AND BREWER, E. A. A composable framework for secure multi-modal access to Internet services from Post-PC devices. Mobile. Network Applications. 7, 5 (2002), 389-406.
-
ROSS, S. J., HILL, J. L., CHEN, M. Y., JOSEPH, A. D., CULLER, D. E., AND BREWER, E. A. A composable framework for secure multi-modal access to Internet services from Post-PC devices. Mobile. Network Applications. 7, 5 (2002), 389-406.
-
-
-
-
28
-
-
57349133271
-
-
SCHNEIER, B. Applied cryptography: protocols, algorithms, and sourcecode in C. John Wiley & Sons, New York, 1994.
-
SCHNEIER, B. Applied cryptography: protocols, algorithms, and sourcecode in C. John Wiley & Sons, New York, 1994.
-
-
-
-
30
-
-
57349150817
-
-
SOPHOS PRESS RELEASE. UK online bank accounts put at risk by new trojan. Available from http://www.sophos.com/virusinfo/articles/ukbanktrojan.html.
-
SOPHOS PRESS RELEASE. UK online bank accounts put at risk by new trojan. Available from http://www.sophos.com/virusinfo/articles/ukbanktrojan.html.
-
-
-
-
31
-
-
84937431479
-
The personal server: Changing the way we think about ubiquitous computing
-
Proc. 4th Int. Conf. on Ubiquitous Computing, Goteburg, Sweden
-
WANT, R, PERING, T., DANNEELS, G., KUMAR, M., SUNDAR, M., & LIGHT, J. The personal server: Changing the way we think about ubiquitous computing. Proc. 4th Int. Conf. on Ubiquitous Computing, 2002, pp194-209. Goteburg, Sweden, Springer LNCS 2498.
-
(2002)
Springer LNCS
, vol.2498
, pp. 194-209
-
-
WANT, R.1
PERING, T.2
DANNEELS, G.3
KUMAR, M.4
SUNDAR, M.5
LIGHT, J.6
-
33
-
-
57349129232
-
-
XMLHTTP. Available at
-
XMLHTTP. Available at: http://en.wikipedia.org/wiki/XMLHttpRequest.
-
-
-
|