Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,081,298 papers from all fields of science
Search
Sign In
Create Free Account
Mobile security
Known as:
Mobile phone security
, Mobile Security Strategies
, Smartphone security
Expand
Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Biometrics
Block cipher
Bring your own device
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks
Zhengyi Shang
,
M. Ma
,
Xiaohong Li
Global Communications Conference
2019
Corpus ID: 211686950
With the rising demand for digital world and the emergence of new application scenarios, 5G wireless networks have become the key…
Expand
2013
2013
An Android dynamic data protection model based on light virtualization
Qingqing Sun
,
Tao Qi
,
Tan Yang
,
Yidong Cui
15th IEEE International Conference on…
2013
Corpus ID: 952900
Today's smartphones are not only tools for entertainment and communication, but also very effective tools for increasing the…
Expand
Highly Cited
2012
Highly Cited
2012
MOSES: supporting operation modes on smartphones
G. Russello
,
M. Conti
,
B. Crispo
,
Earlence Fernandes
ACM Symposium on Access Control Models and…
2012
Corpus ID: 2910354
Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power…
Expand
2011
2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures
Kari Kostiainen
,
E. Reshetova
,
Jan-Erik Ekberg
,
N. Asokan
Conference on Data and Application Security and…
2011
Corpus ID: 14182725
The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research…
Expand
2011
2011
Android Application Analysis Method for Malicious Activity Detection
W. Sim
,
Jong-Myoung Kim
,
Jaecheol Ryou
,
Bongnam Noh
2011
Corpus ID: 60008253
Due to the rapid growth of smartphone market, the security threats are also increased. One of the smartphone security threats is…
Expand
2011
2011
Secure Trust Delegation for Sharing Patient Medical Records in a Mobile Environment
D. Weerasinghe
,
R. Muttukrishnan
International Conference on Wireless…
2011
Corpus ID: 7244502
2010
2010
A low-complexity heterogeneous multi-core platform for security soc
Wei Huang
,
Jun Han
,
Shuai Wang
,
Xiaoyang Zeng
IEEE Asian Solid-State Circuits Conference
2010
Corpus ID: 34710866
This paper presents a heterogeneous multi-core SoC platform to deal with intensive cryptography algorithms in different security…
Expand
2006
2006
Navigation and Mobile Security System of Home Security Robot
Ren C. Luo
,
P. K. Wang
,
Y. F. Tseng
,
Tung-Yi Lin
IEEE International Conference on Systems, Man and…
2006
Corpus ID: 263891473
We have recently developed an intelligent security architecture in robot (ISR). Image system, security system, multi-interaction…
Expand
2001
2001
A hierarchical framework model of mobile security
Jun-Zhao Sun
,
D. Howie
,
A. Koivisto
,
J. Sauvola
12th IEEE International Symposium on Personal…
2001
Corpus ID: 6284397
As wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of…
Expand
1990
1990
Modeling the Environment of a Mobile Security Robot
H. Everett
,
G. Gilbreath
,
T. Tran
,
J. Nieusma
1990
Corpus ID: 108543223
Abstract : ROBART II is a battery powered autonomous robot being used by the Naval Ocean Systems Center (NOSC) in San Diego, CA…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE