메뉴 건너뛰기




Volumn , Issue , 2011, Pages 5-12

Smartphone security limitations: Conflicting traditions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING PLATFORM; FUNDAMENTAL LIMITATIONS; MOBILE PHONE PLATFORMS; NATIONAL INFRASTRUCTURE; PLATFORM ARCHITECTURE; SMART PHONES; SOCIAL PRACTICES;

EID: 84855302062     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2076496.2076497     Document Type: Conference Paper
Times cited : (20)

References (27)
  • 9
    • 33750310718 scopus 로고    scopus 로고
    • Informed Consent by Design
    • chapter 24, O'Reilly, Sebastopol, CA, USA
    • B. Friedman, P. Lin, and J. K. Miller. Security and Usability, chapter 24, "Informed Consent by Design", pages 495-521. O'Reilly, Sebastopol, CA, USA, 2005.
    • (2005) Security and Usability , pp. 495-521
    • Friedman, B.1    Lin, P.2    Miller, J.K.3
  • 11
    • 80053345545 scopus 로고    scopus 로고
    • Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures
    • Sep.
    • S. A. Golder and M. W. Macy. Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science, 333(6051):1878-1881, Sep. 2011.
    • (2011) Science , vol.333 , Issue.6051 , pp. 1878-1881
    • Golder, S.A.1    Macy, M.W.2
  • 15
    • 0003368492 scopus 로고
    • Privacy enhancement for internet electronic mail: Part II: Certificate-based key management
    • Feb.
    • S. Kent. Privacy enhancement for internet electronic mail: Part II: Certificate-based key management. RFC 1422, Feb. 1993.
    • (1993) RFC , vol.1422
    • Kent, S.1
  • 20
    • 85060708313 scopus 로고    scopus 로고
    • An attack sheds light on internet security holes
    • Apr. 7
    • R. Richmond. An attack sheds light on internet security holes. The New York Times, page B3, Apr. 7, 2011.
    • (2011) The New York Times
    • Richmond, R.1
  • 21
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sep.
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sep. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 22
    • 84855315449 scopus 로고    scopus 로고
    • Hacker rattles security circles
    • Sep. 12
    • S. Sengupta. Hacker rattles security circles. The New York Times, page B1, Sep. 12, 2011.
    • (2011) The New York Times
    • Sengupta, S.1
  • 23
    • 0011584005 scopus 로고    scopus 로고
    • Technical Report Data Privacy Working Paper 3, Laboratory for International Data Privacy, Carnegie Mellon University, Pittsburgh, PA, USA
    • L. Sweeney. Uniqueness of Simple Demographics in the U.S. Population. Technical Report Data Privacy Working Paper 3, Laboratory for International Data Privacy, Carnegie Mellon University, Pittsburgh, PA, USA, 2000.
    • (2000) Uniqueness of Simple Demographics in the U.S. Population
    • Sweeney, L.1
  • 27
    • 77949637414 scopus 로고    scopus 로고
    • The psychiatrist-patient relationship of the future: Anytime, anywhere?
    • P. Yellowlees and N. Nafiz. The psychiatrist-patient relationship of the future: Anytime, anywhere? Harvard Review of Psychiatry, 18(2):96-102, 2010.
    • (2010) Harvard Review of Psychiatry , vol.18 , Issue.2 , pp. 96-102
    • Yellowlees, P.1    Nafiz, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.