Security in mobile systems

V Subramanyam, A Joshi - Reliable Distributed Systems, IEEE …, 1998 - computer.org
Mobile computing has become popular over the last few years. Users need to have continuous
access to information even when they are mobile, eg, a doctor may need to constantly …

Security, privacy, and trust in mobile systems

M Cremonini, E Damiani, SC di Vimercati… - … Security and Ethics …, 2008 - igi-global.com
… In this article we have discussed the need for privacy and security in mobile systems and
have presented technological trends that highlight that this issue is of growing concern. …

A systematic review on security and privacy issues in mobile devices and systems

M Alloghani, T Baker, D Al-Jumeily, A Hussain… - Handbook of Computer …, 2020 - Springer
… However, given the nature and debates around privacy and security in mobile systems,
the search will be conducted in several databases which Digital library IEEE Xplore, Digital …

Security for smart mobile networks: The NEMESYS approach

E Gelenbe, G Gorbil, D Tzovaras… - … in Mobile Systems  …, 2013 - ieeexplore.ieee.org
The growing popularity of smart mobile devices such as smartphones and tablets has made
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …

Security, privacy, and trust in mobile systems and applications

M Cremonini, E Damiani, SDC di Vimercati… - Mobile and Wireless …, 2005 - igi-global.com
… This chapter discusses the need for privacy and security in mobile systems and presents …
In this chapter we have discussed the need for privacy and security in mobile systems and have …

Security, privacy, and trust in mobile systems

A Corallo, M Cremonini, E Damiani… - Mobile and Wireless …, 2005 - air.unimi.it
… This chapter discusses the need for privacy and security in mobile systems and presents …
This chapter discusses the need for privacy and security in mobile systems and presents …

Transparent authentication systems for mobile device security: A review

S Alotaibi, S Furnell, N Clarke - 2015 10th International …, 2015 - ieeexplore.ieee.org
Sensitive data such as text messages, contact lists, and personal information are stored on
mobile devices. This makes authentication of paramount importance. More security is needed …

Security and privacy in the Internet of Things: Current status and open issues

M Abomhara, GM Køien - … and security in mobile systems  …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to
interconnect and exchange information and useful data. As IoT systems will be ubiquitous and …

Security in Mobile Systems

A Joshi, V Subramanyam - Workshop on Security in Large …, 1998 - ebiquity.umbc.edu
Mobile computing has become popular over the last few years. Users need to have continuous
access to information even when they are mobile, eg, a doctor may need to constantly …

Android encryption systems

P Teufl, A Fitzek, D Hein, A Marsalek… - … in Mobile Systems  …, 2014 - ieeexplore.ieee.org
The high usability of smartphones and tablets is embraced by consumers as well as the
corporate and public sector. However, especially in the non-consumer area the factor security …