-
2
-
-
84857731594
-
Security associations for wireless device
-
Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Troubador Publishing Ltd., Leicester
-
Asokan, N., Nyberg, K.: Security associations for wireless device. In: Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Security and Privacy in Mobile and Wireless Networking, pp. 23-62. Troubador Publishing Ltd., Leicester (2009), http://research.ics.tkk.fi/publications/knyberg/secass.pdf
-
(2009)
Security and Privacy in Mobile and Wireless Networking
, pp. 23-62
-
-
Asokan, N.1
Nyberg, K.2
-
3
-
-
33847652928
-
Advanced user authentication for mobile devices
-
Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Computers & Security 26(2), 109-119 (2007), http://dx.doi.org/10. 1016/j.cose.2006.08.008
-
(2007)
Computers & Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.2
-
4
-
-
77956257835
-
A closer look at recognition-based graphical passwords on mobile devices
-
Cranor, L.F. (ed.) SOUPS
-
Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, vol. 485. ACM (2010), http://doi.acm.org/10.1145/1837110.1837114
-
(2010)
ACM International Conference Proceeding Series
, vol.485
-
-
Dunphy, P.1
Heiner, A.P.2
Asokan, N.3
-
5
-
-
79958074269
-
Using context-profiling to aid access control decisions in mobile devices
-
IEEE
-
Gupta, A., Miettinen, M., Asokan, N.: Using context-profiling to aid access control decisions in mobile devices. In: PerCom Workshops, pp. 310-312. IEEE (2011), http://dx.doi.org/10.1109/PERCOMW.2011.5766891
-
(2011)
PerCom Workshops
, pp. 310-312
-
-
Gupta, A.1
Miettinen, M.2
Asokan, N.3
-
6
-
-
84935078039
-
Security Weaknesses in Bluetooth
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176-191. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
7
-
-
79952846708
-
Old, new, borrowed, blue -: A perspective on the evolution of mobile platform security architectures
-
Sandhu, R.S., Bertino, E. (eds.) ACM
-
Kostiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue -: a perspective on the evolution of mobile platform security architectures. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 13-24. ACM (2011), http://doi.acm.org/10.1145/1943513.1943517
-
(2011)
CODASPY
, pp. 13-24
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
8
-
-
84857707164
-
-
Technical Report CMU-CyLab-05-005
-
Kuo, C., Goh, V., Tang, A., Perrig, A.,Walker, J.: Empowering ordinary consumers to securely configure their mobile devices and wireless networks. Technical Report CMU-CyLab-05-005, Carnegie Mellon University (2005), http://repository.cmu.edu/cylab/65/
-
(2005)
Empowering Ordinary Consumers to Securely Configure Their Mobile Devices and Wireless Networks
-
-
Kuo, C.1
Goh, V.2
Tang, A.3
Perrig, A.4
Walker, J.5
-
9
-
-
78650086390
-
Towards security policy decisions based on context profiling
-
Greenstadt, R. (ed.)
-
Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Greenstadt, R. (ed.) AISec, pp. 19-23. ACM (2010), http://doi.acm.org/10.1145/1866423.1866428
-
(2010)
AISec
, pp. 19-23
-
-
Miettinen, M.1
Asokan, N.2
-
13
-
-
61849117271
-
Standards for security associations in personal networks: A comparative analysis
-
Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2), 87-100 (2009)
-
(2009)
IJSN
, vol.4
, Issue.1-2
, pp. 87-100
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
14
-
-
39149106769
-
On predictive models and user-drawn graphical passwords
-
van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4) (2008), http://doi.acm.org/10.1145/1284680.1284685
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.4
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
15
-
-
12844271558
-
Aligning security and usability
-
Yee, K.-P.: Aligning security and usability. IEEE Security and Privacy 2, 48-55 (2004)
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 48-55
-
-
Yee, K.-P.1
|