1. Alberts CJ, Dorofee AJ (2002) Managing information security risks: the OCTAVE approach. Addison-Wesley Professional, pp 1–471
2. Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on Smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies, No. 1, No. 7, pp 1–10
3. Chin E, Felt AP, Sekary V, Wagner D (2012) Measuring user confidence in Smartphone security and privacy. The 2012 Symposium on Usable Privacy and Security (SOUPS), No. 1, pp 1–16
4. Gong YI (2010) Implications and agreement of Smartphone. Korea Inf Soc Dev Inst 22(4)
5. Hyeong-Il K, Yong-Ki K, Jae-Woo C (2013) A grid-based cloaking area creation scheme for continuous LBS queries in distributed systems. J Converg 4(1)