Author:
Muzammal Syeda Mariam,Shah Munam Ali,Zhang Si-Jing,Yang Hong-Ji
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Modelling and Simulation,Control and Systems Engineering
Reference59 articles.
1. K. Zhang, X. H. Liang, X. M. Shen, R. X. Lu. Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Communications Magazine, vol. 52, no. 3, pp. 58–65, 2014.
2. I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, K. Beznosov. Understanding users’ requirements for data protection in smartphones. In Proceedings of the 28th International Conference on Data Engineering Workshops, IEEE, Arlington, USA, pp. 228–235, 2012.
3. M. La Polla, F. Martinelli, D. Sgandurra. A survey on security for mobile devices. IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 446–471, 2013.
4. D. Ghosh, A. Joshi, T. Finin, P. Jagtap. Privacy control in smart phones using semantically rich reasoning and context modeling. In Proceedings of 2012 IEEE Symposium on Security and Privacy Workshops, IEEE, San Francisco, USA, pp. 82–85, 2012.
5. N. L. Clarke, S. M. Furnell. Authentication of users on mobile telephones-A survey of attitudes and practices. Computers & Security, vol. 24, no. 7, pp. 519–527, 2005.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献