Author:
Kim Hyun-Woo,Jeong Young-Sik
Reference10 articles.
1. Mulliner C, Vigna G, Dagon D, Lee W (2006) Using labeling to prevent cross-service attacks against smart phones. In: DIMVA 2006, LNCS 4064, pp 91–108
2. Carey M (2005) Enterprise risk management: how to jumpstart your implementation efforts. International Risk Management Institute
3. Park M (2011) The evolution of the mobile phones with touchscreen and the prospect of future: focused on the SRI-Tech. Master thesis, Incheon University
4. Wang G, Zhou W, Yang LT (2013) Trust, security and privacy for pervasive applications. J Supercomput 64(3):661–663
5. Jaegal B (2010) Trend of smartphone market and mobile OS. Samsung Wireless Division