메뉴 건너뛰기




Volumn , Issue , 2010, Pages 43-48

When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments

Author keywords

Malicious software; Mobile devices; Security models

Indexed keywords

COMPUTING ENVIRONMENTS; MALICIOUS SOFTWARE; MOBILE ENVIRONMENTS; MOBILE PLATFORM; MOBILE SECURITY; SECURITY CHALLENGES; SECURITY MODEL;

EID: 77951558980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1734583.1734595     Document Type: Conference Paper
Times cited : (66)

References (16)
  • 1
    • 77951587037 scopus 로고    scopus 로고
    • Personal Communications with the Google Android Security Team
    • Personal Communications with the Google Android Security Team, 2009.
    • (2009)
  • 2
    • 46449104590 scopus 로고    scopus 로고
    • Pocket hypervisors: Opportunities and challenges
    • L. Cox and P. Chen. Pocket hypervisors: Opportunities and challenges. Proceedings of HotMobile, 2007.
    • (2007) Proceedings of HotMobile
    • Cox, L.1    Chen, P.2
  • 4
    • 51849128784 scopus 로고    scopus 로고
    • Mobile Trusted Module (MTM)-An Introduction
    • J. Ekberg and M. Kylánpáá. Mobile Trusted Module (MTM)-An Introduction. Nokia Research, 2007.
    • (2007) Nokia Research
    • Ekberg, J.1    Kylánpáá, M.2
  • 5
    • 20344390532 scopus 로고    scopus 로고
    • Handheld hazards: The rise of malware on mobile devices
    • S. Furnell. Handheld hazards: The rise of malware on mobile devices. Computer Fraud & Security, 2005.
    • (2005) Computer Fraud & Security
    • Furnell, S.1
  • 7
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged A5 stream cipher
    • J. Golic. Cryptanalysis of alleged A5 stream cipher. Lecture Notes in Computer Science, 1233:239-255, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 239-255
    • Golic, J.1
  • 11
    • 44649199229 scopus 로고    scopus 로고
    • When malware attacks (anything but windows)
    • A. O'Donnell. When malware attacks (anything but windows). IEEE SECURITY & PRIVACY, pages 68-70, 2008.
    • (2008) IEEE SECURITY & PRIVACY , pp. 68-70
    • O'Donnell, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.