Publisher
Springer International Publishing
Reference71 articles.
1. Albaghli, R., Anderson, K.M.: A vision for heart rate health through wearables. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp 2016, pp. 1101–1105 (2016)
2. Alpers, S., Pieper, M., Wagner, M.: Herausforderungen bei der Entwicklung von Anwendungen zum Selbstdatenschutz. In: Informatik 2017: Digitale Kulturen, Tagungsband der 47. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 25.9-29.9.2017, Chemnitz. LNI, vol. 275, pp. 1061–1072 (2017). (in German)
3. Lecture Notes in Computer Science;M Backes,2013
4. Banuri, H., et al.: An Android runtime security policy enforcement framework. Pers. Ubiquit. Comput. 16(6), 631–641 (2012)
5. Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 73–84 (2010)