메뉴 건너뛰기




Volumn , Issue , 2011, Pages 465-473

On the need for different security methods on mobile phones

Author keywords

authentication; authentication methods; data protection; graded security model; mobile phone security; survey

Indexed keywords

AUTHENTICATION METHODS; CONTEXT OF USE; CURRENT PROTECTION; DATA PROTECTION; DATA TYPE; DIFFERENTIAL DATA; MOBILE COMPUTERS; PERSONAL IDENTIFICATION NUMBER; SECURITY METHODS; SECURITY MODEL; SMARTPHONES;

EID: 80054841454     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2037373.2037442     Document Type: Conference Paper
Times cited : (102)

References (25)
  • 2
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • Botha, R., Furnell, S., and Clarke, N.: From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4):130-137, 2009.
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 130-137
    • Botha, R.1    Furnell, S.2    Clarke, N.3
  • 4
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones - A survey of attitudes and practices
    • DOI 10.1016/j.cose.2005.08.003, PII S0167404805001446
    • Clarke, N., and Furnell, S.: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security, 24(7):519-527, 2005. (Pubitemid 41455412)
    • (2005) Computers and Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.L.1    Furnell, S.M.2
  • 5
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
    • Clarke, N., and Furnell, S.: Advanced user authentication for mobile devices. Computers &Security, 26(2):109-119, 2007. (Pubitemid 46367239)
    • (2007) Computers and Security , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.L.1    Furnell, S.M.2
  • 6
    • 0036276843 scopus 로고    scopus 로고
    • Acceptance of subscriber authentication methods for mobile telephony devices
    • DOI 10.1016/S0167-4048(02)00304-8
    • Clarke, N., Furnell, S., Rodwell, P., and Reynolds P.: Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220-228, 2002. (Pubitemid 34593576)
    • (2002) Computers and Security , vol.21 , Issue.3 , pp. 220-228
    • Clarke, N.L.1    Furnell, S.M.2    Rodwell, P.M.3    Reynolds, P.L.4
  • 9
    • 49849102834 scopus 로고    scopus 로고
    • Beyond the pin: Enhancing user authentication for mobile devices
    • Furnell, S., Clarke, N., and Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008(8):12-17, 2008.
    • (2008) Computer Fraud & Security , vol.2008 , Issue.8 , pp. 12-17
    • Furnell, S.1    Clarke, N.2    Karatzouni, S.3
  • 10
    • 80054843510 scopus 로고    scopus 로고
    • IDC press release from 28 Jan at
    • IDC: IDC press release from 28 Jan 2010 at www.idc.com/getdoc.jsp? containerId=prUS22186410
    • (2010)
  • 11
    • 80054844075 scopus 로고    scopus 로고
    • Consumer Password Worst Practices
    • Imperva Application Defense Center: at
    • Imperva Application Defense Center: Consumer Password Worst Practices. Imperva 2010 at www.imperva.com/docs/WP-Consumer-Password-Worst-Practices.pdf
    • (2010) Imperva
  • 15
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers
    • Leavitt, N.: Mobile phones: The next frontier for hackers. IEEE Computer, 38(4): 20-23, 2005.
    • (2005) IEEE Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 18
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • Riley, S.: Password security: what users know and what they actually do. Usability News, 8(1), 2006.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 19
    • 84964853055 scopus 로고    scopus 로고
    • Access Control: Policies, Models, and Mechanisms
    • Foundations of Security Analysis and Design
    • Samarati, P. and De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. Lecture Notes in Computer Science, pages 137-196, 2001. (Pubitemid 33364380)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2171 , pp. 137-196
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 23
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1):31-41, 2000.
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 25
    • 80054840544 scopus 로고    scopus 로고
    • Examined websites as of early February LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com
    • Examined websites (as of early February 2011): Apple, Inc.: www.apple.com, LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.