-
1
-
-
85170013322
-
-
March
-
Android Community ROM. http://www.cyanogenmod.com/, March 2010.
-
(2010)
Android Community ROM
-
-
-
3
-
-
85170008059
-
-
January
-
Mobile Watchdog. http://www.mymobilewatchdog.com/, January 2010.
-
(2010)
-
-
-
4
-
-
85170024394
-
-
January
-
SMS Trap. http://www.smstrap.com/, January 2010.
-
(2010)
-
-
-
5
-
-
85170010547
-
-
January
-
Stealth SMS. http://stealthsms.trusters.com/s-features.htm, January 2010.
-
(2010)
-
-
-
6
-
-
77956986526
-
-
A5/1 Security Project
-
A5/1 Security Project. Creating A5/1 Rainbow Tables. http://reflextor. com/trac/a51, 2009.
-
(2009)
Creating A5/1 Rainbow Tables
-
-
-
7
-
-
85170015092
-
-
March
-
Apache Software Foundation. Apache James Mime4j. http://james.apache.org/ mime4j/, March 2010.
-
(2010)
Apache James Mime4j
-
-
-
9
-
-
33645995393
-
Device-enabled authorization in the grey system
-
L. Bauer, S. Garriss, J. M. Mccune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the grey system. In Proceedings of the 8th Information Security Conference (ISC'05), pages 431-445, 2005.
-
(2005)
Proceedings of the 8th Information Security Conference (ISC'05)
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
Mccune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
10
-
-
0038570707
-
-
E. Becker, W. Buhse, D. Günnewig, and N. Rump, editors. Digital Rights Management Technological, Economic, Legal and Political Aspects. Springer, 1 edition, 2003.
-
(2003)
Digital Rights Management Technological, Economic, Legal and Political Aspects. Springer, 1 Edition
-
-
Becker, E.1
Buhse, W.2
Günnewig, D.3
Rump, N.4
-
13
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D. E. Denning. A Lattice Model of Secure Information Flow. Commun. ACM, 19(5):236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
51849128784
-
-
Technical Report NRC-TR-2007-015, Nokia Research Center, Helsinki, Finland, Nov.
-
J.-E. Ekberg and M. Kyläanpää. Mobile Trusted Module (MTM) - An Introduction. Technical Report NRC-TR-2007-015, Nokia Research Center, Helsinki, Finland, Nov. 2007.
-
(2007)
Mobile Trusted Module (MTM) - An Introduction
-
-
Ekberg, J.-E.1
Kyläanpää, M.2
-
17
-
-
85170010909
-
-
Free Software Foundation, Inc. June
-
Free Software Foundation, Inc. The Campaign to Eliminate DRM. http://www.defectivebydesign.org/, June 2010.
-
(2010)
The Campaign to Eliminate DRM
-
-
-
19
-
-
35248866223
-
Certificate-Based Encryption and the Certificate-Revocation Problem
-
January
-
C. Gentry. Certificate-Based Encryption and the Certificate-Revocation Problem. Advances in Cryptology, 2656, January 2003.
-
(2003)
Advances in Cryptology
, vol.2656
-
-
Gentry, C.1
-
20
-
-
85170023280
-
A Framework for Secure Message Transmission Using SMS-Based VPN
-
M. Gholami, S. M. Hashemi, and M. Teshnelab. A Framework for Secure Message Transmission Using SMS-Based VPN. Research and Practical Issues of Enterprise Information Systems II, 1:503-511, 2008.
-
(2008)
Research and Practical Issues of Enterprise Information Systems
, vol.2
, Issue.1
, pp. 503-511
-
-
Gholami, M.1
Hashemi, S.M.2
Teshnelab, M.3
-
21
-
-
78751531717
-
-
Jan.
-
GigaOm. The Apple App Store Economy. http://gigaom.com/2010/01/12/the- apple-app-store-economy, Jan. 2010.
-
(2010)
The Apple App Store Economy
-
-
-
22
-
-
84947242701
-
Toward Hierarchical Identity-Based Encryption
-
London, UK, Springer-Verlag
-
J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. In Proceedings of EUROCRYPT '02, pages 466-481, London, UK, 2002. Springer-Verlag.
-
(2002)
Proceedings of EUROCRYPT '02
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
23
-
-
33748598990
-
An Efficient Identity-Based Cryptosystem for End-to-End Mobile Security
-
September
-
J.-S. Hwu, R.-J. Chen, and Y.-B. Lin. An Efficient Identity-Based Cryptosystem for End-to-End Mobile Security. IEEE Trans. Wireless Comm., 5(9):2586-2593, September 2006.
-
(2006)
IEEE Trans. Wireless Comm.
, vol.5
, Issue.9
, pp. 2586-2593
-
-
Hwu, J.-S.1
Chen, R.-J.2
Lin, Y.-B.3
-
25
-
-
0003704494
-
-
Version 3. May
-
IETF Network Working Group. Post Office Protocol - Version 3. http://www.ietf.org/rfc/rfc1939.txt, May 1996.
-
(1996)
Post Office Protocol
-
-
-
26
-
-
0003833905
-
-
Version 4, rev1. March
-
IETF Network Working Group. Internet Message Access Protocol - Version 4, rev1. http://www.ietf.org/rfc/rfc1939.txt, March 2003.
-
(2003)
Internet Message Access Protocol
-
-
-
29
-
-
37249029813
-
-
February
-
S. Jobs. Thoughts on Music. http://www.apple.com/hotnews/thoughtsonmusic/ , February 2007.
-
(2007)
Thoughts on Music
-
-
Jobs, S.1
-
31
-
-
85170018645
-
Secure Key Issuing in ID-based Cryptography
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Secure Key Issuing in ID-based Cryptography. In Proceedings of the ACSW Frontiers Workshop, 2004.
-
Proceedings of the ACSW Frontiers Workshop, 2004
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
33
-
-
85170007143
-
-
version 6.0. (EXCHG.80).aspx, May
-
Microsoft Corporation. ActiveSync HTTP Protocol Specification, version 6.0. http://msdn.microsoft.com/en-us/library/dd299446(EXCHG.80).aspx, May 2010.
-
(2010)
ActiveSync HTTP Protocol Specification
-
-
-
34
-
-
85170011243
-
-
June
-
Microsoft Corporation. Microsoft PlayReady. http://www.microsoft.com/ playready/default.mspx, June 2010.
-
(2010)
Microsoft PlayReady
-
-
-
35
-
-
57349085063
-
Measuring Integrity on Mobile Phone Systems
-
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger. Measuring Integrity on Mobile Phone Systems. In Proceedings of ACM SACMAT, June 2008.
-
Proceedings of ACM SACMAT, June 2008
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
37
-
-
14844298063
-
-
Open Mobile Alliance Ltd. Version 1.0. Technical Report OMA-Download-DRMREL-V1-0-20040615-A, Open Mobile Alliance, June
-
Open Mobile Alliance Ltd. Rights Expression Language Version 1.0. Technical Report OMA-Download-DRMREL-V1-0-20040615-A, Open Mobile Alliance, June 2004.
-
(2004)
Rights Expression Language
-
-
-
39
-
-
78751524896
-
-
Open Mobile Alliance Ltd. Version 2.0.2. Technical Report OMA-TS-DRM REL-V2-0-2-20080723-A, Open Mobile Alliance, July
-
Open Mobile Alliance Ltd. DRM Rights Expression Language Version 2.0.2. Technical Report OMA-TS-DRM REL-V2-0-2-20080723-A, Open Mobile Alliance, July 2008.
-
(2008)
DRM Rights Expression Language
-
-
-
48
-
-
70350654576
-
Securing Mobile Phone Calls with Identity-Based Cryptography
-
June
-
M. Smith, C. Schridde, B. Agel, and B. Freisleben. Securing Mobile Phone Calls with Identity-Based Cryptography. LNCS: Advances in Information Security and Assurance, 5576:210-222, June 2009.
-
(2009)
LNCS: Advances in Information Security and Assurance
, vol.5576
, pp. 210-222
-
-
Smith, M.1
Schridde, C.2
Agel, B.3
Freisleben, B.4
-
49
-
-
70749096362
-
-
TCG. Specification Version 1.2, Level 2 Revision 103
-
TCG. TPM Main: Part 1 - Design Principles. Specification Version 1.2, Level 2 Revision 103. 2007.
-
(2007)
TPM Main: Part 1 - Design Principles
-
-
-
51
-
-
56749160373
-
A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks
-
Z. Wan, K. Ren, and B. Preneel. A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks. In Proceedings of ACM WiSec, 2008.
-
Proceedings of ACM WiSec, 2008
-
-
Wan, Z.1
Ren, K.2
Preneel, B.3
-
52
-
-
77950788046
-
Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis. In Proceedings of ACM CCS, 2007.
-
Proceedings of ACM CCS, 2007
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|