Decoupling data-at-rest encryption and smartphone locking with wearable devices (English)
- New search for: Muslukhov, Ildar
- New search for: Sun, San-Tsai
- New search for: Wijesekera, Primal
- New search for: Boshmaf, Yazan
- New search for: Beznosov, Konstantin
- New search for: Muslukhov, Ildar
- New search for: Sun, San-Tsai
- New search for: Wijesekera, Primal
- New search for: Boshmaf, Yazan
- New search for: Beznosov, Konstantin
In:
Pervasive and mobile computing
;
32
;
26-34
;
2016
-
ISSN:
- Article (Journal) / Print
-
Title:Decoupling data-at-rest encryption and smartphone locking with wearable devices
-
Contributors:Muslukhov, Ildar ( author ) / Sun, San-Tsai ( author ) / Wijesekera, Primal ( author ) / Boshmaf, Yazan ( author ) / Beznosov, Konstantin ( author )
-
Published in:Pervasive and mobile computing ; 32 ; 26-34
-
Publisher:
- New search for: ELSEVIER SCIENCE B.V., AMSTERDAM
-
Publication date:2016-01-01
-
Size:9 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 004.6
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004.6 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 32
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Mobile security and privacy: Advances, challenges and future research directionsChoo, Kim-Kwang Raymond / Rokach, Lior / Bettini, Claudio et al. | 2016
- 3
-
DroidChain: A novel Android malware detection method based on behavior chainsWang, Zhaoguo / Li, Chenglong / Yuan, Zhenlong / Guan, Yi / Xue, Yibo et al. | 2016
- 15
-
An integrated static detection and analysis framework for androidSong, Jun / Han, Chunling / Wang, Kaixin / Zhao, Jian / Ranjan, Rajiv / Wang, Lizhe et al. | 2016
- 26
-
Decoupling data-at-rest encryption and smartphone locking with wearable devicesMuslukhov, Ildar / Sun, San-Tsai / Wijesekera, Primal / Boshmaf, Yazan / Beznosov, Konstantin et al. | 2016
- 35
-
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policyHovav, Anat / Putri, Frida Ferdani et al. | 2016
- 50
-
Android users in the wild: Their authentication and usage behaviorMahfouz, Ahmed / Muslukhov, Ildar / Beznosov, Konstantin et al. | 2016
- 62
-
Android fine-grained permission control system with real-time expert recommendationsRashidi, Bahman / Fung, Carol / Vu, Tam et al. | 2016
- 78
-
Mobile local search with noisy locationsDewri, Rinku / Thurimella, Ramakrishna et al. | 2016
- 93
-
A-PIE: An algorithm for preserving privacy, quality of information, and energy consumption in Participatory Sensing SystemsVergara-Laurens, Idalides J. / Mendez, Diego / Jaimes, Luis G. / Labrador, Miguel et al. | 2016