-
1
-
-
84887488396
-
-
July
-
European Central Bank, “Report on card fraud,” July 2012, http://www.ecb.int/pub/pdf/other/cardfraudreport201207en.pdf.
-
(2012)
Report on card fraud
-
-
-
2
-
-
85180625463
-
-
and Mastercard International Inc., Patent No. WO/2011/022062
-
P. Fourez and Mastercard International Inc., “Location controls on payment card transactions,” http://patentscope.wipo.int/search/en/ WO2011022062, 2011, Patent No. WO/2011/022062.
-
(2011)
Location controls on payment card transactions
-
-
Fourez, P.1
-
3
-
-
77950798658
-
Leveraging cellular infrastructure to improve fraud prevention
-
F. S. Park, C. Gangakhedkar, and P. Traynor, “Leveraging cellular infrastructure to improve fraud prevention,” in Proceedings of the 25th Annual Computer Security Applications Conference, ser. ACSAC’09, 2009, pp. 350–359.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference, ser. ACSAC’09
, pp. 350-359
-
-
Park, F. S.1
Gangakhedkar, C.2
Traynor, P.3
-
4
-
-
85180635510
-
-
last access
-
Barclays, “Mobile PINsentry,” http://goo.gl/pcuGo, last access 2013.
-
(2013)
Mobile PINsentry
-
-
-
5
-
-
84889061914
-
-
last access 2013
-
Google Inc., “Google 2-Step Verification,” http://www.google.com/landing/2step/, last access 2013.
-
Google 2-Step Verification
-
-
-
6
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild,” in ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM’11, 2011.
-
(2011)
ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM’11
-
-
Felt, A. P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
10
-
-
84864334953
-
Software abstractions for trusted sensors
-
H. Liu, S. Saroiu, A. Wolman, and H. Raj, “Software abstractions for trusted sensors,” in The 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), 2012.
-
(2012)
The 10th International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Liu, H.1
Saroiu, S.2
Wolman, A.3
Raj, H.4
-
11
-
-
84888997234
-
Secure enrollment and practical migration for mobile trusted execution environments
-
C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and S. Capkun, “Secure enrollment and practical migration for mobile trusted execution environments,” in Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM’13, 2013.
-
(2013)
Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM’13
-
-
Marforio, C.1
Karapanos, N.2
Soriente, C.3
Kostiainen, K.4
Capkun, S.5
-
12
-
-
84878353718
-
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
-
May [Online]. Available
-
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” in 2012 IEEE Symposium on Security and Privacy, May 2012. [Online]. Available: http://www.cl.cam.ac.uk/~jcb82/doc/BHOS12-IEEESP-quest_to_replace_passwords.pdf
-
(2012)
2012 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
Herley, C.2
van Oorschot, P. C.3
Stajano, F.4
-
13
-
-
4344670280
-
Deploying and using public key technology: lessons learned in real life
-
R. Guida, R. Stahl, T. Bunt, G. Secrest, and J. Moorcones, “Deploying and using public key technology: lessons learned in real life,” IEEE Security Privacy, vol. 2, no. 4, 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.4
-
-
Guida, R.1
Stahl, R.2
Bunt, T.3
Secrest, G.4
Moorcones, J.5
-
14
-
-
84869430752
-
Strengthening user authentication through opportunistic cryptographic identity assertions
-
A. Czeskis, M. Dietz, T. Kohno, D. S. Wallach, and D. Balfanz, “Strengthening user authentication through opportunistic cryptographic identity assertions,” in Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. CCS’12, 2012, pp. 404–414.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. CCS’12
, pp. 404-414
-
-
Czeskis, A.1
Dietz, M.2
Kohno, T.3
Wallach, D. S.4
Balfanz, D.5
-
15
-
-
80755187832
-
Unicorn: two-factor attestation for data security
-
M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, “Unicorn: two-factor attestation for data security,” in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11, 2011, pp. 17–28.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11
, pp. 17-28
-
-
Mannan, M.1
Kim, B. H.2
Ganjali, A.3
Lie, D.4
-
16
-
-
79952846708
-
Old, new, borrowed, blue – a perspective on the evolution of mobile platform security architectures
-
K. Kostiainen, E. Reshetova, J.-E. Ekberg, and N. Asokan, “Old, new, borrowed, blue – a perspective on the evolution of mobile platform security architectures,” in ACM conference on Data and application security and privacy, ser. CODASPY’11, 2011.
-
(2011)
ACM conference on Data and application security and privacy, ser. CODASPY’11
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
17
-
-
74049088382
-
On-board credentials with open provisioning
-
K. Kostiainen, J.-E. Ekberg, N. Asokan, and A. Rantala, “On-board credentials with open provisioning,” in International Symposium on Information, Computer, and Communications Security, ser. ASIACCS’09, 2009.
-
(2009)
International Symposium on Information, Computer, and Communications Security, ser. ASIACCS’09
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
-
18
-
-
84888992183
-
-
GlobalPlatform
-
GlobalPlatform, “Device specifications,” available at: http://www.globalplatform.org/specificationsdevice.asp.
-
Device specifications
-
-
-
19
-
-
85180634367
-
-
last access
-
osmocomBB, http://bb.osmocom.org, last access 2013.
-
(2013)
osmocomBB
-
-
-
21
-
-
85180631648
-
-
last access
-
Offspark B.V., “PolarSSL,” https://polarssl.org/, last access 2013.
-
(2013)
PolarSSL
-
-
Offspark, B.V.1
-
22
-
-
85180625843
-
-
ARM
-
ARM, “ARM Motherboard Express,” http://www.arm.com/products/tools/development-boards/versatile-express/motherboard-express.php.
-
ARM Motherboard Express
-
-
-
23
-
-
85180622562
-
-
ARM
-
ARM, “ARM Coretile Express,” http://www.arm.com/products/tools/development-boards/versatile-express/coretile-express.php.
-
ARM Coretile Express
-
-
-
25
-
-
85180635786
-
-
GlobalPlatform, last access 2013
-
GlobalPlatform, “GlobalPlatform Device Specifications,” http://www.globalplatform.org/specificationsdevice.asp, last access 2013.
-
GlobalPlatform Device Specifications
-
-
-
26
-
-
85180621031
-
-
Android Development Team, “Android 4.1 APIs - Jelly Bean,” http://developer.android.com/about/versions/jelly-bean.html, 2013.
-
(2013)
Android 4.1 APIs - Jelly Bean
-
-
-
27
-
-
84899062857
-
-
last access
-
Bouncy Castle Crypto APIs, http://www.bouncycastle.org, last access 2013.
-
(2013)
Bouncy Castle Crypto APIs
-
-
-
28
-
-
84874719223
-
-
G. Inc., last access 2013
-
G. Inc., “Google Cloud Messaging for Android,” http://developer.android.com/google/gcm/index.html, last access 2013.
-
Google Cloud Messaging for Android
-
-
-
30
-
-
85180620589
-
-
last access
-
SQLite Development Team, “SQLite,” http://www.sqlite.org, last access 2013.
-
(2013)
SQLite
-
-
-
31
-
-
85180625366
-
-
Comcetera Ltd., “Number Portability Lookup,” http://www.numberportabilitylookup.com/, 2013.
-
(2013)
Number Portability Lookup
-
-
-
33
-
-
85180623622
-
-
Mastercard, [Online]. Available
-
Mastercard, “Mastercard Developer Zone,” 2013. [Online]. Available: https://developer.mastercard.com/
-
(2013)
Mastercard Developer Zone
-
-
-
34
-
-
85180629322
-
-
VISA, [Online]. Available
-
VISA, “Visa Developer Program,” 2013. [Online]. Available: https://developer.visa.com/
-
(2013)
Visa Developer Program
-
-
-
35
-
-
85180629900
-
-
June
-
Telegraph, “EU to end mobile roaming charges next year,” June 2013, http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/telecoms/10119159/ EU-to-end-mobile-roaming-charges-next-year.html.
-
(2013)
EU to end mobile roaming charges next year
-
-
-
36
-
-
34047176451
-
On the suitability of the short message service for emergency warning systems
-
R. Pries, T. Hobfeld, and P. Tran-Gia, “On the suitability of the short message service for emergency warning systems,” in Proceedings of the 63rd Vehicular Technology Conference, ser. VTC 2006-Spring, vol. 2, 2006, pp. 991–995.
-
(2006)
Proceedings of the 63rd Vehicular Technology Conference, ser. VTC 2006-Spring
, vol.2
, pp. 991-995
-
-
Pries, R.1
Hobfeld, T.2
Tran-Gia, P.3
-
37
-
-
85180631166
-
-
ValidSoft, [Online]. Available
-
ValidSoft, “ValidPOS,” 2013. [Online]. Available: http://www.validsoft.com/
-
(2013)
ValidPOS
-
-
-
38
-
-
84872066245
-
-
last access 2013
-
Google Inc., “Google wallet,” http://www.google.com/wallet/, last access 2013.
-
Google wallet
-
-
-
40
-
-
23244459906
-
Trusted paths for browsers
-
Z. Ye, S. W. Smith, and D. Anthony, “Trusted paths for browsers,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 153–186, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S. W.2
Anthony, D.3
-
41
-
-
80755182857
-
Towards a trusted mobile desktop
-
M. Selhorst, C. Stüble, F. Feldmann, and U. Gnaida, “Towards a trusted mobile desktop,” in International conference on Trust and trustworthy computing, ser. TRUST’10, 2010.
-
(2010)
International conference on Trust and trustworthy computing, ser. TRUST’10
-
-
Selhorst, M.1
Stüble, C.2
Feldmann, F.3
Gnaida, U.4
-
43
-
-
74049155648
-
The emperor’s new security indicators
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, “The emperor’s new security indicators,” in IEEE Symposium on Security and Privacy, ser. SP’07, 2007.
-
(2007)
IEEE Symposium on Security and Privacy, ser. SP’07
-
-
Schechter, S. E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
44
-
-
57649166927
-
You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings
-
S. Egelman, L. F. Cranor, and J. Hong, “You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings,” in SIGCHI Conference on Human Factors in Computing Systems, ser. CHI’08, 2008, pp. 1065–1074.
-
(2008)
SIGCHI Conference on Human Factors in Computing Systems, ser. CHI’08
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L. F.2
Hong, J.3
-
45
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
C. Jackson, D. R. Simon, D. S. Tan, and A. Barth, “An evaluation of extended validation and picture-in-picture phishing attacks,” in International Conference on Financial cryptography and International conference on Usable Security, ser. FC’07/USEC’07, 2007, pp. 281–293.
-
(2007)
International Conference on Financial cryptography and International conference on Usable Security, ser. FC’07/USEC’07
, pp. 281-293
-
-
Jackson, C.1
Simon, D. R.2
Tan, D. S.3
Barth, A.4
-
49
-
-
85180627367
-
-
SD Association, last access 2013
-
SD Association, “smartSD Memory Cards,” hhttps://www.sdcard.org/developers/overview/ASSD/smartsd/, last access 2013.
-
smartSD Memory Cards
-
-
-
50
-
-
85022096670
-
-
PayPal
-
PayPal, “PayPal Security Key,” https://www.paypal.com/securitykey/.
-
PayPal Security Key
-
-
-
51
-
-
84875683653
-
-
RSA, “RSA SecurID,” http://www.emc.com/security/rsa-securid.htm/.
-
RSA SecurID
-
-
-
52
-
-
85180621771
-
United Bankers’ Bank Authenticates Customers Online
-
“United Bankers’ Bank Authenticates Customers Online,” Biometric Technology Today, vol. 12, no. 6, p. 4, 2004.
-
(2004)
Biometric Technology Today
, vol.12
, Issue.6
, pp. 4
-
-
-
53
-
-
85180623409
-
Bank of Utah Adopts Keystroke Dynamics
-
“Bank of Utah Adopts Keystroke Dynamics,” Biometric Technology Today, vol. 15, no. 5, p. 5, 2007.
-
(2007)
Biometric Technology Today
, vol.15
, Issue.5
, pp. 5
-
-
-
54
-
-
84874229442
-
-
VISA, “Verified by VISA,” http://www.visaeurope.com/en/cardholders/verified_by_visa.aspx.
-
Verified by VISA
-
-
-
55
-
-
85180637568
-
-
JVL Ventures, LLC
-
JVL Ventures, LLC, “ISIS,” https://www.paywithisis.com/.
-
ISIS
-
-
-
57
-
-
83455250475
-
Youprove: authenticity and fidelity in mobile sensing
-
J. Liu, P. Levis, and K. Römer, Eds. ACM
-
P. Gilbert, J. Jung, K. Lee, H. Qin, D. Sharkey, A. Sheth, and L. P. Cox, “Youprove: authenticity and fidelity in mobile sensing,” in SenSys, J. Liu, P. Levis, and K. Römer, Eds. ACM, 2011, pp. 176–189.
-
(2011)
SenSys
, pp. 176-189
-
-
Gilbert, P.1
Jung, J.2
Lee, K.3
Qin, H.4
Sharkey, D.5
Sheth, A.6
Cox, L. P.7
-
58
-
-
77951556632
-
Toward trustworthy mobile sensing
-
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, “Toward trustworthy mobile sensing,” in Proceedings of ACM International Workshop on Mobile Computing Systems and Applications (HotMobile), 2010.
-
(2010)
Proceedings of ACM International Workshop on Mobile Computing Systems and Applications (HotMobile)
-
-
Gilbert, P.1
Cox, L. P.2
Jung, J.3
Wetherall, D.4
-
59
-
-
84859028284
-
Towards trustworthy participatory sensing
-
A. Dua, N. Bulusu, and W. chang Feng, “Towards trustworthy participatory sensing,” in 4th USENIX Workshop on Hot Topics in Security (HotSec), 2009, pp. 1–6.
-
(2009)
4th USENIX Workshop on Hot Topics in Security (HotSec)
, pp. 1-6
-
-
Dua, A.1
Bulusu, N.2
chang Feng, W.3
-
60
-
-
84864345731
-
-
Microsoft Research, Tech. Rep. MSR-TR-2011-130
-
H. Raj, D. Robinson, T. Tariq, P. England, S. Saroiu, and A. Wolman, “Credo: Trusted computing for guest vms with a commodity hypervisor,” Microsoft Research, Tech. Rep. MSR-TR-2011-130, 2011.
-
(2011)
Credo: Trusted computing for guest vms with a commodity hypervisor
-
-
Raj, H.1
Robinson, D.2
Tariq, T.3
England, P.4
Saroiu, S.5
Wolman, A.6
-
61
-
-
33746335051
-
Differential privacy
-
M. Bugliesi, B. Preneel, Sassone, and I. Wegener, Eds., Springer
-
C. Dwork, “Differential privacy,” in ICALP (2), ser. Lecture Notes in Computer Science, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., vol. 4052. Springer, 2006, pp. 1–12.
-
(2006)
ICALP (2), ser. Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
62
-
-
84864353539
-
Plug-n-trust: practical trusted sensing for mhealth
-
J. Sorber, M. Shin, R. A. Peterson, and D. Kotz, “Plug-n-trust: practical trusted sensing for mhealth,” in International Conference on Mobile Systems, Applications, and Services, ser. MobiSys’12, 2012.
-
(2012)
International Conference on Mobile Systems, Applications, and Services, ser. MobiSys’12
-
-
Sorber, J.1
Shin, M.2
Peterson, R. A.3
Kotz, D.4
-
63
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, “Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in OSDI, 2010, pp. 393–407.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
gon Chun, B.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
|