[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shetty et al., 2017 - Google Patents

Are you dating danger? An interdisciplinary approach to evaluating the (in) security of android dating apps

Shetty et al., 2017

View PDF
Document ID
8477575711093983880
Author
Shetty R
Grispos G
Choo K
Publication year
Publication venue
IEEE Transactions on Sustainable Computing

External Links

Snippet

In today's age of instant gratification, mobile dating applications (apps) provide the comfort of meeting new people at the swipe of a finger. However, recent high profile incidents have raised security and privacy-related concerns with the use of these apps. The level of harm …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Shetty et al. Are you dating danger? An interdisciplinary approach to evaluating the (in) security of android dating apps
Bojjagani et al. PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification
Cao et al. Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel
Puthal et al. Decision tree based user-centric security solution for critical IoT infrastructure
Arunkumar et al. A review paper on preserving privacy in mobile environments
Naeem et al. A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)
Dutta et al. Cyber security: Issues and current trends
Hurkała et al. Architecture of context-risk-aware authentication system for web environments
Haber et al. Attack vectors
Sidhardhan et al. Weaponizing Real-world Applications as C2 (Command and Control)
Monir A Lightweight Attribute-Based Access Control System for IoT.
Harsha et al. Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage
Kaushik et al. a novel approach for an automated advanced MITM attack on IoT networks
Dashtinejad Security system for mobile messaging applications
Feher et al. The security of WebRTC
Routh et al. Attacks and vulnerability analysis of e-mail as a password reset point
Saatjohann et al. STALK: Security analysis of smartwatches for kids
Jindal et al. Multi-factor authentication scheme using mobile app and camera
Jagannath et al. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures
Anthi et al. Sensitive data in smartphone applications: Where does it go? can it be intercepted?
Luvanda Proposed framework for securing mobile banking applications from man in the middle attacks
Ghazizadeh et al. Secure OpenID authentication model by using Trusted Computing
Osman et al. Detection of JavaScript Injection Eavesdropping on WebRTC communications
Li et al. Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories
Mena Blockchain-based security framework for the internet of things and home networks