메뉴 건너뛰기




Volumn 7154 LNCS, Issue , 2012, Pages 1-6

Usable mobile security

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE SECURITY; USABLE SECURITY;

EID: 84857699433     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28073-3_1     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 1
  • 2
    • 84857731594 scopus 로고    scopus 로고
    • Security associations for wireless device
    • Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Troubador Publishing Ltd., Leicester
    • Asokan, N., Nyberg, K.: Security associations for wireless device. In: Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Security and Privacy in Mobile and Wireless Networking, pp. 23-62. Troubador Publishing Ltd., Leicester (2009), http://research.ics.tkk.fi/publications/knyberg/secass.pdf
    • (2009) Security and Privacy in Mobile and Wireless Networking , pp. 23-62
    • Asokan, N.1    Nyberg, K.2
  • 3
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Computers & Security 26(2), 109-119 (2007), http://dx.doi.org/10. 1016/j.cose.2006.08.008
    • (2007) Computers & Security , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.L.1    Furnell, S.2
  • 4
    • 77956257835 scopus 로고    scopus 로고
    • A closer look at recognition-based graphical passwords on mobile devices
    • Cranor, L.F. (ed.) SOUPS
    • Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, vol. 485. ACM (2010), http://doi.acm.org/10.1145/1837110.1837114
    • (2010) ACM International Conference Proceeding Series , vol.485
    • Dunphy, P.1    Heiner, A.P.2    Asokan, N.3
  • 5
    • 79958074269 scopus 로고    scopus 로고
    • Using context-profiling to aid access control decisions in mobile devices
    • IEEE
    • Gupta, A., Miettinen, M., Asokan, N.: Using context-profiling to aid access control decisions in mobile devices. In: PerCom Workshops, pp. 310-312. IEEE (2011), http://dx.doi.org/10.1109/PERCOMW.2011.5766891
    • (2011) PerCom Workshops , pp. 310-312
    • Gupta, A.1    Miettinen, M.2    Asokan, N.3
  • 6
    • 84935078039 scopus 로고    scopus 로고
    • Security Weaknesses in Bluetooth
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176-191. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 7
    • 79952846708 scopus 로고    scopus 로고
    • Old, new, borrowed, blue -: A perspective on the evolution of mobile platform security architectures
    • Sandhu, R.S., Bertino, E. (eds.) ACM
    • Kostiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue -: a perspective on the evolution of mobile platform security architectures. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 13-24. ACM (2011), http://doi.acm.org/10.1145/1943513.1943517
    • (2011) CODASPY , pp. 13-24
    • Kostiainen, K.1    Reshetova, E.2    Ekberg, J.-E.3    Asokan, N.4
  • 9
    • 78650086390 scopus 로고    scopus 로고
    • Towards security policy decisions based on context profiling
    • Greenstadt, R. (ed.)
    • Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Greenstadt, R. (ed.) AISec, pp. 19-23. ACM (2010), http://doi.acm.org/10.1145/1866423.1866428
    • (2010) AISec , pp. 19-23
    • Miettinen, M.1    Asokan, N.2
  • 13
    • 61849117271 scopus 로고    scopus 로고
    • Standards for security associations in personal networks: A comparative analysis
    • Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2), 87-100 (2009)
    • (2009) IJSN , vol.4 , Issue.1-2 , pp. 87-100
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 14
    • 39149106769 scopus 로고    scopus 로고
    • On predictive models and user-drawn graphical passwords
    • van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4) (2008), http://doi.acm.org/10.1145/1284680.1284685
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.10 , Issue.4
    • Van Oorschot, P.C.1    Thorpe, J.2
  • 15
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • Yee, K.-P.: Aligning security and usability. IEEE Security and Privacy 2, 48-55 (2004)
    • (2004) IEEE Security and Privacy , vol.2 , pp. 48-55
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.