Author:
Khan Muhammad Umair,Chowdhury Farhana,Jahangir Zarmina,Ofougwuka Francis
Publisher
Springer International Publishing
Reference17 articles.
1. iCloud - Find my iPhone. https://www.apple.com/ca/icloud/find-my-iphone/ . Accessed July 2017
2. uConekt. http://uconekt.com/lynk/ . Accessed July 2017
3. Kayayurt, B., Tuglular, T.: End-to-end security implementation for mobile devices using TLS protocol. J. Comput. Virol. 2(1), 87–97 (2006)
4. Burnside, M., Clarke, D., Mills, T., Devadas, S., Rivest, R.: Proxy-based security protocols in networked mobile devices. In: Symposium on Applied Computing (SAC 2002), pp. 265–272 (2002)
5. Shen, W., et al.: Secure key establishment for device-to-device communications. In: IEEE Global Communications Conference (GLOBECOM), pp. 336–340 (2014)