-
5
-
-
84889057324
-
-
BARCLAYS (last access 2013). goo.gl/pcuGo
-
BARCLAYS. Mobile PINsentry. (last access 2013). goo.gl/pcuGo.
-
Mobile PINsentry
-
-
-
6
-
-
84874874586
-
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
-
BUSOLD, C., TAHA, A., WACHSMANN, C., DMITRIENKO, A., SEUDIÉ, H., SOBHANI, M., AND SADEGHI, A.-R. Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. In ACM conference on Data and application security and privacy (2013), CODASPY'13.
-
ACM Conference on Data and Application Security and Privacy (2013), CODASPY'13
-
-
Busold, C.1
Taha, A.2
Wachsmann, C.3
Dmitrienko, A.4
Seudié, H.5
Sobhani, M.6
Sadeghi, A.-R.7
-
7
-
-
84874828214
-
SmartTokens: Delegable Access Control with NFC-enabled Smartphones
-
DMITRIENKO, A., SADEGHI, A.-R., TAMRAKAR, S., AND WACHSMANN, C. SmartTokens: Delegable Access Control with NFC-enabled Smartphones. In International Conference on Trust and Trustworthy Computing (2011), TRUST'11.
-
International Conference on Trust and Trustworthy Computing (2011), TRUST'11
-
-
Dmitrienko, A.1
Sadeghi, A.-R.2
Tamrakar, S.3
Wachsmann, C.4
-
8
-
-
80755181021
-
A survey of mobile malware in the wild
-
FELT, A. P., FINIFTER, M., CHIN, E., HANNA, S., AND WAGNER, D. A survey of mobile malware in the wild. In ACM workshop on Security and privacy in smartphones and mobile devices (2011), SPSM'11.
-
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), SPSM'11
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
9
-
-
84889012868
-
-
last access 2013
-
GEMALTO. Mobile ID. (last access 2013). www.gemalto.com/govt/coesys/ mobile-id.html.
-
Mobile ID
-
-
-
10
-
-
84889034065
-
-
Version 2.2.1
-
GLOBALPLATFORM. Card Specification Version 2.2.1. www.globalplatform.org/ specificationscard.asp.
-
Card Specification
-
-
-
11
-
-
84888992183
-
-
GLOBALPLATFORM. Device specifications. www.globalplatform.org/ specificationsdevice.asp.
-
Device Specifications
-
-
-
12
-
-
84889061914
-
-
last access 2013
-
GOOGLE INC. Google 2-Step Verification. (last access 2013). www.google.com/landing/2step/.
-
Google 2-Step Verification
-
-
-
13
-
-
84872066245
-
-
last access 2013
-
GOOGLE INC. Google wallet. (last access 2013). www.google.com/wallet/.
-
Google Wallet
-
-
-
14
-
-
84889046503
-
-
last access 2013
-
HARVARD HEALTH PUBLICATIONS. Using smartphone apps for heart health. (last access 2013). www.health.harvard.edu/family-health-guide/updates/using- smartphone-apps-for-heart-health.
-
Using Smartphone Apps for Heart Health
-
-
-
15
-
-
79959325725
-
Towards user-friendly credential transfer on open credential platforms
-
KOSTIAINEN, K., ASOKAN, N., AND AFANASYEVA, A. Towards user-friendly credential transfer on open credential platforms. In International conference on Applied cryptography and network security (2011), ACNS'11, pp. 395-412.
-
International Conference on Applied Cryptography and Network Security (2011), ACNS'11
, pp. 395-412
-
-
Kostiainen, K.1
Asokan, N.2
Afanasyeva, A.3
-
16
-
-
74049088382
-
On-board credentials with open provisioning
-
KOSTIAINEN, K., EKBERG, J.-E., ASOKAN, N., AND RANTALA, A. On-board credentials with open provisioning. In International Symposium on Information, Computer, and Communications Security (2009), ASIACCS'09.
-
International Symposium on Information, Computer, and Communications Security (2009), ASIACCS'09
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
-
17
-
-
79952846708
-
Old, new, borrowed, blue - A perspective on the evolution of mobile platform security architectures
-
KOSTIAINEN, K., RESHETOVA, E., EKBERG, J.-E., AND ASOKAN, N. Old, new, borrowed, blue - a perspective on the evolution of mobile platform security architectures. In ACM conference on Data and application security and privacy (2011), CODASPY'11.
-
ACM Conference on Data and Application Security and Privacy (2011), CODASPY'11
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
18
-
-
70349332824
-
Caveat emptor: A comparative study of secure device pairing methods
-
KUMAR, A., SAXENA, N., TSUDIK, G., AND UZUN, E. Caveat emptor: A comparative study of secure device pairing methods. In IEEE International Conference on Pervasive Computing and Communications (2009), PerCom'09, pp. 1-10.
-
IEEE International Conference on Pervasive Computing and Communications (2009), PerCom'09
, pp. 1-10
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
19
-
-
84977837849
-
Innovative instructions and software model for isolated execution
-
MCKEEN, F., ALEXANDROVICH, I., BERENZON, A., ROZAS, C., SHAFI, H., SHANBHOGUE, V., AND SAVAGAONKAR, U. Innovative instructions and software model for isolated execution. In Workshop on Hardware and Architectural Support for Security and Privacy (2013).
-
Workshop on Hardware and Architectural Support for Security and Privacy (2013)
-
-
Mckeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.7
-
20
-
-
84889015857
-
New York Transit Authority to Test Tag-based Ticketing with Nokia NFC Phones
-
(last access 2013). nfctimes.com/news/new-york-transit-authority-test
-
NFC TIMES. New York Transit Authority to Test Tag-based Ticketing with Nokia NFC Phones. (last access 2013). nfctimes.com/news/new-york-transit- authority-test-tag-based-ticketing-nokia-nfc-phones.
-
NFC Times
-
-
-
22
-
-
74049155648
-
The emperor's new security indicators
-
SCHECHTER, S. E., DHAMIJA, R., OZMENT, A., AND FISCHER, I. The emperor's new security indicators. In IEEE Symposium on Security and Privacy (2007), SP'07.
-
IEEE Symposium on Security and Privacy (2007), SP'07
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
23
-
-
77954719036
-
Towards a trusted mobile desktop
-
SELHORST, M., STÜBLE, C., FELDMANN, F., AND GNAIDA, U. Towards a trusted mobile desktop. In International conference on Trust and trustworthy computing (2010), TRUST'10.
-
International Conference on Trust and Trustworthy Computing (2010), TRUST'10
-
-
Selhorst, M.1
Stüble, C.2
Feldmann, F.3
Gnaida, U.4
-
24
-
-
84864353539
-
Plug-n-trust: Practical trusted sensing for mhealth
-
SORBER, J., SHIN, M., PETERSON, R. A., AND KOTZ, D. Plug-n-trust: practical trusted sensing for mhealth. In International Conference on Mobile Systems, Applications, and Services (2012), MobiSys'12.
-
International Conference on Mobile Systems, Applications, and Services (2012), MobiSys'12
-
-
Sorber, J.1
Shin, M.2
Peterson, R.A.3
Kotz, D.4
-
26
-
-
85013162432
-
Using trusted execution environment in two-factor authentication: Comparing approaches
-
VAN RIJSWIJK-DEIJ, R., AND POLL, E. Using trusted execution environment in two-factor authentication: comparing approaches. In Open Identity Summit (2013), OID'13.
-
Open Identity Summit (2013), OID'13
-
-
Van Rijswijk-Deij, R.1
Poll, E.2
-
27
-
-
84863094040
-
Trustworthy execution on mobile devices: What security properties can my mobile platform give me?
-
VASUDEVAN, A., OWUSU, E., ZHOU, Z., NEWSOME, J., AND MCCUNE, J. M. Trustworthy execution on mobile devices: What security properties can my mobile platform give me? In International Conference on Trust and Trustworthy Computing (2012), TRUST'12, pp. 159-178.
-
International Conference on Trust and Trustworthy Computing (2012), TRUST'12
, pp. 159-178
-
-
Vasudevan, A.1
Owusu, E.2
Zhou, Z.3
Newsome, J.4
Mccune, J.M.5
-
29
-
-
23244459906
-
Trusted paths for browsers
-
YE, Z., SMITH, S. W., AND ANTHONY, D. Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8, 2 (2005), 153-186.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S.W.2
Anthony, D.3
|