Mobile security

Known as: Mobile phone security, Mobile Security Strategies, Smartphone security 
Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
We introduce a new mobile system framework, SenSec, which uses passive sensory data to ensure the security of applications and… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
2013
2013
Touch-based verification --- the use of touch gestures (e.g., swiping, zooming, etc.) to authenticate users of touch screen… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular… (More)
  • table I
  • figure 1
  • table II
  • figure 4
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Review
2011
Review
2011
We are currently moving from the Internet society to a mobile society where more and more access to information is done by… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints and practical computational and… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Modern mobile devices continue to approach the capabilities and extensibility of standard desktop PCs. Unfortunately, these… (More)
  • table 1
  • table 3
  • table 2
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Covered in: ICS 243G, Ch. 11-16 in Stallings, & Ch. 7, 34 from Cranor-Garfinkel. • Authentication Applications and PKI… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?