-
2
-
-
84924350178
-
Integrated technologies for communication security on mobile devices
-
A. Braga. Integrated technologies for communication security on mobile devices. In MOBILITY 2013, The Third International Conference on Mobile Services, Resources, and Users, pages 47-51, 2013.
-
(2013)
MOBILITY 2013, the Third International Conference on Mobile Services, Resources, and Users
, pp. 47-51
-
-
Braga, A.1
-
3
-
-
84877990396
-
Bind your phone number with caution: Automated user profiling through address book matching on smartphone
-
ACM
-
Y. Cheng, L. Ying, S. Jiao, P. Su, and D. Feng. Bind your phone number with caution: automated user profiling through address book matching on smartphone. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 335-340. ACM, 2013.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 335-340
-
-
Cheng, Y.1
Ying, L.2
Jiao, S.3
Su, P.4
Feng, D.5
-
4
-
-
85037073388
-
Privilege escalation attacks on android
-
L. Davi, A. Dmitrienko, A. Sadeghi, and M. Winandy. Privilege escalation attacks on android. Information Security, pages 346-360, 2011.
-
(2011)
Information Security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.3
Winandy, M.4
-
8
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
San Fansisco, CA
-
A. Felt, H. Wang, A. Moshchuk, S. Hanna, E. Chin, K. Greenwood, D. Wagner, D. Song, M. Finifter, J. Weinberger, et al. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, San Fansisco, CA, 2011.
-
(2011)
20th Usenix Security Symposium
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
Greenwood, K.6
Wagner, D.7
Song, D.8
Finifter, M.9
Weinberger, J.10
-
9
-
-
85084161244
-
Dos and don'ts of client authentication on the web
-
USENIX Association
-
K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and Don'ts of Client Authentication on the Web. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, pages 19-19. USENIX Association, 2001.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium
, vol.10
, pp. 19
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
10
-
-
84930610642
-
-
Accessed: 2014-08-04
-
J. Koum. 400 million stories. http://blog.whatsapp.com/index.php/2013/12/400-million-stories/, 2013. Accessed: 2014-08-04.
-
(2013)
400 Million Stories
-
-
Koum, J.1
-
11
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems (TOCS), 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems (TOCS)
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
84930580980
-
-
Accessed: 2014-08-04
-
R. Paleari. A look at wechat security. http://blog.emaze.net/2013/09/a-look-at-wechat-security.html, 2013. Accessed: 2014-08-04.
-
(2013)
A Look at Wechat Security
-
-
Paleari, R.1
-
15
-
-
85030411408
-
Guess who's texting you? Evaluating the security of smartphone messaging applications
-
S. Schrittwieser, P. Frühwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. R. Weippl. Guess who's texting you? evaluating the security of smartphone messaging applications. In NDSS, 2012.
-
(2012)
NDSS
-
-
Schrittwieser, S.1
Frühwirt, P.2
Kieseberg, P.3
Leithner, M.4
Mulazzani, M.5
Huber, M.6
Weippl, E.R.7
|