Balancing Security and Usability of Local Security Mechanisms for Mobile Devices (English)
- New search for: Yang, S.
- New search for: Bal, G.
- New search for: Yang, S.
- New search for: Bal, G.
- New search for: Perez, Carlos A.
- New search for: Souza, Angelo Malachias de
In:
International Congress on X-ray Optics and Microanalysis
;
327-338
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
-
Contributors:
-
Conference:conference; 21st, International Congress on X-ray Optics and Microanalysis ; 2011 ; Campinas, Brazil
-
Published in:AIP CONFERENCE PROCEEDINGS ; 1437 ; 327-338
-
Publisher:
- New search for: American Institute of Physics
-
Place of publication:Melville, N.Y.
-
Publication date:2012-01-01
-
Size:12 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Relay Attacks on Secure Element-Enabled Mobile Devices: Virtual Pickpocketing RevisitedRoland, M. / Langer, J. / Scharinger, J. et al. | 2012
- 9
-
Ultra-high performance mirror systems for the imaging and coherence beamline I13 at the Diamond Light SourceWagner, U.H. / Alcock, S. / Ludbrook, G. / Wiatryzk, J. / Rau, C. et al. | 2012
- 13
-
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)Armando, A. / Merlo, A. / Migliardi, M. / Verderame, L. et al. | 2012
- 15
-
Study of multilayer-reflected beam profiles and their coherence properties using beamlines ID19 (ESRF) and 32-ID (APS)Rack, A. / Assoufid, L. / Dietsch, R. / Weitkamp, T. / Trabelsi, S.B. / Rack, T. / Siewert, F. / Kramer, M. / Holz, T. / Zanette, I. et al. | 2012
- 18
-
Energy dispersive x-ray reflectivity applied to the study of thermal stability of self-assembled organic multilayers: Resultson on phosphonic acidsDe Pauli, M. / Perez, C.A. / Malachias, A. et al. | 2012
- 24
-
A multilayer grating with a novel layer structure for a flat-field spectrograph attached to transmission electron microscopes in energy region of 2-4 keVImazono, T. / Koike, M. / Koeda, M. / Nagano, T. / Sasai, H. / Oue, Y. / Yonezawa, Z. / Kuramoto, S. / Terauchi, M. / Takahashi, H. et al. | 2012
- 25
-
An Approach to Detecting Inter-Session Data Flow Induced by Object PoolingBerger, B.J. / Sohr, K. et al. | 2012
- 29
-
Palmtop EPMA by electric batteryImashuku, S. / Imanishi, A. / Kawai, J. et al. | 2012
- 32
-
High counting rates of x-ray photon detection using APD detectors on synchrotron machinesKakuno, E.M. / Giacomolli, B.A. / Scorzato, C.R. et al. | 2012
- 37
-
Embedded Eavesdropping on Java CardBarbu, G. / Giraud, C. / Guerin, V. et al. | 2012
- 39
-
Application of synchrotron radiation computed microtomography for quantification of bone microstructure in human and rat bonesNogueira, L.P. / Barroso, R.C. / de Almeida, A.P. / Braz, D. / de Almeida, C.E. / de Andrade, C.B. / Tromba, G. et al. | 2012
- 45
-
Correlations of trace elements in breast human tissues: Evaluation of spatial distribution using μ-XRFda Silva, M.P. / da Silva, D.M. / Ribeiro-Silva, A. / Poletti, M.E. et al. | 2012
- 49
-
Authenticated Key Exchange (AKE) in Delay Tolerant NetworksMenesidou, S.A. / Katos, V. et al. | 2012
- 50
-
Elemental concentrations in skin of patients with fibroeptelial polip using synchrotron radiation total reflection x-ray fluorescenceSoares, J.C.A.C.R. / Anjos, M.J. / Canellas, C.G.L. / Lopes, R.T. et al. | 2012
- 57
-
Nonlinear, noniterative, single-distance phase retrieval and developmental biologyMoosmann, J. / Altapova, V. / Hanschke, D. / Hofmann, R. / Baumbach, T. et al. | 2012
- 61
-
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity ManagementAugusto, A.B. / Correia, M.E. et al. | 2012
- 63
-
In-line x-ray phase-contrast tomography and diffraction-contrast tomography study of the ferrite-cementite microstructure in steelKostenko, A. / Sharma, H. / Dere, E.G. / King, A. / Ludwig, W. / Van Oel, W. / Offerman, S.E. / Stallinga, S. / van Vliet, L.J. et al. | 2012
- 69
-
Characterization by TEM of kaolinite to production of polymer nanocompositesde Macedo Neto, J.C. / Lona, L.M.F. et al. | 2012
- 72
-
Image characterization after SEM analysis for equimolar samples of Nb~2O~5-YTZPGuimaraes, N.M. / Reis, D.A.P. / De Moura Neto, C. / Neto, F.P. / de Assis, J.M.K. et al. | 2012
- 75
-
Smart OpenID: A Smart Card Based OpenID ProtocolLeicher, A. / Schmidt, A.U. / Shah, Y. et al. | 2012
- 79
-
Nanoscale imaging using a compact laser plasma EUV sourceWachulak, P. / Bartnik, A. / Fiedorowicz, H. / Kostecki, J. / Jarocki, R. / Szczurek, M. / Szczurek, A. / Feigl, T. / Pina, L. et al. | 2012
- 85
-
Advanced STEM microanalysis of bimetallic nanoparticle catalystsLyman, C.E. / Dimick, P.S. et al. | 2012
- 87
-
Peer to Peer Botnet Detection Based on Flow IntervalsZhao, D. / Traore, I. / Ghorbani, A. / Sayed, B. / Saad, S. / Lu, W. et al. | 2012
- 89
-
Fabrication and characterization of analyzer gratings with high aspect ratios for phase contrast imaging using a Talbot interferometerKenntner, J. / Altapova, V. / Grund, T. / Pantenburg, F.J. / Meiser, J. / Baumbach, T. / Mohr, J. et al. | 2012
- 94
-
Neural induced embryoid bodies present high levels of metals detected by x-ray microfluorescenceStelling, M.P. / Cardoso, S.C. / Paulsen, B.S. / Rehen, S.K. et al. | 2012
- 98
-
Spatial distribution of elements in the spheroids by prostate tumor cells using synchrotron radiation x-ray fluorescenceLeitao, R.G. / Santos, C.A.N. / Junior, A.P. / Souza, P.A.V.R. / Canellas, C.G.L. / Anjos, M.J. / Nasciutti, L.E. / Lopes, R.T. et al. | 2012
- 103
-
Towards a Universal Data Provenance Framework Using Dynamic InstrumentationGessiou, E. / Pappas, V. / Athanasopoulos, E. / Keromytis, A.D. / Ioannidis, S. et al. | 2012
- 104
-
Evaluation of photon irradiation treatment upon calcium content of ribs of Wistar rats using micro-XRFNogueira, L.P. / Barroso, R.C. / de Almeida, A.P. / Braz, D. / de Almeida, C.E. / Salata, C. / Andrade, C.B. / da Silva, C.M. et al. | 2012
- 111
-
Geometric scattering in prism-array lenses for hard x-rays: Measurements, simulations and modelsNillius, P. et al. | 2012
- 115
-
Improving Flask Implementation Using Hardware Assisted In-VM IsolationDing, B. / Yao, F. / Wu, Y. / He, Y. et al. | 2012
- 116
-
Refractive optical elements and optical system for high energy x-ray microscopySimon, M. / Altapova, V. / Baumbach, T. / Kluge, M. / Last, A. / Marschall, F. / Mohr, J. / Nazmov, V. / Vogt, H. et al. | 2012
- 121
-
Recent development in homemade x-ray polycapillary optic and its application to topics of x-ray opticsPerez, R.D. et al. | 2012
- 126
-
HyperForce: Hypervisor-enForced Execution of Security-Critical CodeGadaleta, F. / Nikiforakis, N. / Muhlberg, J.T. / Joosen, W. et al. | 2012
- 126
-
X-ray optics for laser-plasma sources: Applications of intense SXR and EUV radiation pulsesBartnik, A. / Fiedorowicz, H. / Jarocki, R. / Kostecki, J. / Szczurek, A. / Szczurek, M. / Wachulak, P. / Pina, L. et al. | 2012
- 138
-
RandHyp: Preventing Attacks via Xen Hypercall InterfaceWang, F. / Chen, P. / Mao, B. / Xie, L. et al. | 2012
- 150
-
Role Mining under Role-Usage Cardinality ConstraintJohn, J.C. / Sural, S. / Atluri, V. / Vaidya, J.S. et al. | 2012
- 162
-
HIDE_DHCP: Covert Communications through Network Configuration MessagesRios, R. / Onieva, J.A. / Lopez, J. et al. | 2012
- 174
-
Handling Stateful Firewall AnomaliesCuppens, F. / Cuppens-Boulahia, N. / Garcia-Alfaro, J. / Moataz, T. / Rimasson, X. et al. | 2012
- 187
-
A Framework for Threat Assessment in Access Control SystemsKhambhammettu, H. / Boulares, S. / Adi, K. / Logrippo, L. et al. | 2012
- 199
-
Support for Write Privileges on Outsourced DataDe Capitani di Vimercati, S. / Foresti, S. / Jajodia, S. / Paraboschi, S. / Samarati, P. et al. | 2012
- 211
-
Malicious Users' Transactions: Tackling Insider ThreatLi, W. / Panda, B. / Yaseen, Q. et al. | 2012
- 223
-
Privacy-Preserving Television Audience Measurement Using Smart TVsDrosatos, G. / Tasidou, A. / Efraimidis, P.S. et al. | 2012
- 235
-
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical FeasibilityBanse, C. / Herrmann, D. / Federrath, H. et al. | 2012
- 249
-
Smartphone Forensics: A Proactive Investigation Scheme for Evidence AcquisitionMylonas, A. / Meletiadis, V. / Tsoumas, B. / Mitrou, L. / Gritzalis, D. et al. | 2012
- 261
-
Modeling Social Engineering Botnet Dynamics across Multiple Social NetworksLi, S. / Yun, X. / Hao, Z. / Zhang, Y. / Cui, X. / Wang, Y. et al. | 2012
- 273
-
Layered Analysis of Security CeremoniesBella, G. / Coles-Kemp, L. et al. | 2012
- 287
-
A Small Depth-16 Circuit for the AES S-BoxBoyar, J. / Peralta, R. et al. | 2012
- 299
-
Formal Verification of the mERA-Based eServices with Trusted Third Party ProtocolChristofi, M. / Gouget, A. et al. | 2012
- 315
-
My Authentication Album: Adaptive Images-Based Login MechanismHerzberg, A. / Margulies, R. et al. | 2012
- 327
-
Balancing Security and Usability of Local Security Mechanisms for Mobile DevicesYang, S. / Bal, G. et al. | 2012
- 339
-
Analyzing Value Conflicts for a Work-Friendly ISS Policy ImplementationKolkowska, E. / De Decker, B. et al. | 2012
- 352
-
When Convenience Trumps Security: Defining Objectives for Security and Usability of SystemsDhillon, G. / Oliveira, T. / Susarapu, S. / Caldeira, M. et al. | 2012
- 364
-
Security-by-Contract for the OSGi PlatformGadyatskaya, O. / Massacci, F. / Philippov, A. et al. | 2012
- 376
-
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness AnalysisPark, H. / Jung, S.-O.D. / Lee, H. / In, H.P. et al. | 2012
- 388
-
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in CloudsZhang, Y. / Li, M. / Bai, K. / Yu, M. / Zang, W. et al. | 2012
- 400
-
Give Rookies a Chance: A Trust-Based Institutional Online Supplier Recommendation FrameworkJiao, H. / Liu, J. / Li, J. / Liu, C. et al. | 2012
- 412
-
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante RegulationD Acquisto, G. / Flamini, M. / Naldi, M. et al. | 2012
- 424
-
Optimizing Network Patching Policy DecisionsBeres, Y. / Griffin, J. et al. | 2012
- 443
-
A Risk Assessment Method for SmartphonesTheoharidou, M. / Mylonas, A. / Gritzalis, D. et al. | 2012
- 457
-
Empirical Benefits of Training to Phishing SusceptibilityDodge, R. / Coronges, K. / Rovira, E. et al. | 2012
- 465
-
Multi-modal Behavioural Biometric Authentication for Mobile DevicesSaevanee, H. / Clarke, N.L. / Furnell, S.M. et al. | 2012
- 475
-
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated NetworksNtantogian, C. / Xenakis, C. / Stavrakakis, I. et al. | 2012
- 489
-
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary AttacksWang, Y. et al. | 2012
- 501
-
Distributed Path Authentication for Dynamic RFID-Enabled Supply ChainsCai, S. / Li, Y. / Zhao, Y. et al. | 2012
- 513
-
Enhanced Dictionary Based Rainbow TableThing, V.L.L. / Ying, H.-M. et al. | 2012
- 525
-
Authorization Policies for Materialized ViewsNait-Bahloul, S. / Coquery, E. / Hacid, M.-S. et al. | 2012
- 531
-
Enhancing the Security of On-line Transactions with CAPTCHA KeyboardWu, Y. / Zhao, Z. et al. | 2012
- 537
-
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management ApproachKang, X. / Wu, Y. et al. | 2012
- 543
-
A Framework for Anonymizing GSM Calls over a Smartphone VoIP NetworkPsaroudakis, I. / Katos, V. / Efraimidis, P.S. et al. | 2012
- 549
-
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web PagesPrandini, M. / Ramilli, M. et al. | 2012
- 555
-
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth SystemMilutinovic, M. / Naessens, V. / De Decker, B. et al. | 2012
- 561
-
Web Services Security Assessment: An Authentication-Focused ApproachSoupionis, Y. / Kandias, M. et al. | 2012
- 567
-
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National CasePolemi, N. / Ntouskas, T. et al. | 2012
- 573
-
A Response Strategy Model for Intrusion Response SystemsAnuar, N.B. / Papadaki, M. / Furnell, S. / Clarke, N. et al. | 2012
- 579
-
Intrusion Tolerance of Stealth DoS Attacks to Web ServicesFicco, M. / Rak, M. et al. | 2012
- 585
-
Towards Use-Based Usage ControlGrompanopoulos, C. / Mavridis, I. et al. | 2012