메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 113-116

Towards a user-friendly security-enhancing BYOD solution

Author keywords

Bring Your Own Device (BYOD); Data privacy; Mobile Device Management (MDM); Mobile security

Indexed keywords

BRING YOUR OWN DEVICES; DEVICE MANAGEMENT; MOBILE SECURITY; SECURITY POLICY; SECURITY THREATS;

EID: 84876758444     PISSN: 18805884     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (9)
  • 2
    • 84876762332 scopus 로고    scopus 로고
    • 2012.7
    • VMware:The BYOD Opportunity, http://www.vmware.com/files/pdf/view/VMware- BYOD-Opportunity-Whitepaper.pdf, 2012.7
    • VMware:The BYOD Opportunity
  • 4
    • 84870756073 scopus 로고    scopus 로고
    • AirWatch LLC.:Mobile Security:http://www.air-watch.com/solutions/mobile- security, 2012
    • (2012) Mobile Security
  • 5
    • 84881434738 scopus 로고    scopus 로고
    • Array Networks Inc.:Bring Your Own Device (BYOD), http://www. arraynetworks. com/solutions-byod-bring-your-own-device.html,2012
    • (2012) Bring Your Own Device (BYOD)
  • 6
    • 70350642087 scopus 로고    scopus 로고
    • Craig gentry: Fully homomorphic en-cryption using ideal lattices
    • Craig Gentry:Fully homomorphic en-cryption using ideal lattices,Proceedings of STOC 2009
    • (2009) Proceedings of STOC
  • 7
    • 84872117493 scopus 로고    scopus 로고
    • Analysis of the communication between colluding applications on modern smartphones
    • Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, and Srdjan Capkun:Analysis of the Communication between Colluding Applications on Modern Smartphones, In Proceedings of ACSAC, 2012
    • (2012) Proceedings of ACSAC
    • Marforio, C.1    Ritzdorf, H.2    Francillon, A.3    Capkun, S.4
  • 9
    • 84876768337 scopus 로고    scopus 로고
    • Version 1.5, Revision 3 2012.5
    • Trusted Computing Group:TCG Trusted Network Connect TNC Architecture for Interoperability, http://www.trustedcomputinggroup.org/files/resource-files/ 2884F884-1A4B-B294-D001FAE2E17EA3EB/TNC-Architecture- v1-5-r3-1.pdf, Version 1.5, Revision 3, 2012.5
    • TCG Trusted Network Connect TNC Architecture for Interoperability


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.