ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users
Trust, Privacy, and Security in Digital Business - Lecture Notes in Computer Science
◽
10.1007/978-3-642-40343-9_15
◽
2013
◽
pp. 173-184
◽
Cited By ~ 17
Author(s):
Alexios Mylonas
◽
Dimitris Gritzalis
◽
Bill Tsoumas
◽
Theodore Apostolopoulos
Keyword(s):
Smartphone Security
Download Full-text
Related Documents
Cited By
References
A Survey for User's Awareness and Practices Regarding Smartphone Security and Privacy in Afghanistan
2020 - 5th International Conference on Information Technology (InCIT)
◽
10.1109/incit50588.2020.9310935
◽
2020
◽
Author(s):
Javid Hamdard
◽
Abdurauf Khamosh
◽
Jonathan H. Chan
Keyword(s):
Security And Privacy
◽
Smartphone Security
Download Full-text
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
◽
10.1109/eurospw51379.2020.00028
◽
2020
◽
Author(s):
Elham Al Qahtani
◽
Yousra Javed
◽
Heather Lipford
◽
Mohamed Shehab
Keyword(s):
Saudi Arabia
◽
Smartphone Security
◽
Security Advice
Download Full-text
Smartphone Security Using Fingerprint Password
Journal of Intelligence and Information Systems
◽
10.13088/jiis.2013.19.3.045
◽
2013
◽
Vol 19
(3)
◽
pp. 45-55
Author(s):
Kyoung-Yul Bae
Keyword(s):
Smartphone Security
Download Full-text
A Practical Analysis of Smartphone Security
Lecture Notes in Computer Science - Human Interface and the Management of Information. Interacting with Information
◽
10.1007/978-3-642-21793-7_35
◽
2011
◽
pp. 311-320
◽
Cited By ~ 30
Author(s):
Woongryul Jeon
◽
Jeeyeon Kim
◽
Youngsook Lee
◽
Dongho Won
Keyword(s):
Smartphone Security
◽
Practical Analysis
Download Full-text
Smartphone Security and Privacy
Encyclopedia of Wireless Networks
◽
10.1007/978-3-319-78262-1_300606
◽
2020
◽
pp. 1326-1326
Keyword(s):
Security And Privacy
◽
Smartphone Security
Download Full-text
ESUKOM: Smartphone Security for Enterprise Networks
ISSE 2011 Securing Electronic Business Processes
◽
10.1007/978-3-8348-8652-1_33
◽
2012
◽
pp. 371-382
◽
Cited By ~ 2
Author(s):
Ingo Bente
◽
Josef von Helden
◽
Bastian Hellmann
◽
Joerg Vieweg
◽
Kai-Oliver Detken
Keyword(s):
Enterprise Networks
◽
Smartphone Security
Download Full-text
Implicit Authentication for Smartphone Security
Communications in Computer and Information Science - Information Systems Security and Privacy
◽
10.1007/978-3-319-27668-7_10
◽
2015
◽
pp. 160-176
◽
Cited By ~ 13
Author(s):
Wei-Han Lee
◽
Ruby B. Lee
Keyword(s):
Smartphone Security
Download Full-text
Smartphone security: Overview of security software solutions
8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
◽
10.1109/icitst.2013.6750208
◽
2013
◽
Author(s):
D. Fischer
◽
B. Markscheffel
◽
T. Seyffarth
Keyword(s):
Smartphone Security
◽
Security Software
Download Full-text
A Smartphone Security Architecture for App Verification and Process Authentication
2012 21st International Conference on Computer Communications and Networks (ICCCN)
◽
10.1109/icccn.2012.6289217
◽
2012
◽
Cited By ~ 2
Author(s):
Osman Ugus
◽
Martin Landsmann
◽
Dennis Gessner
◽
Dirk Westhoff
Keyword(s):
Security Architecture
◽
Smartphone Security
Download Full-text
Smartphone Security Risks: Android
International Journal of Electronics and Electrical Engineering
◽
10.18178/ijeee.4.4.346-350
◽
2016
◽
pp. 346-350
◽
Cited By ~ 1
Author(s):
Lee Pin Shing
◽
◽
Lee Hur Shing
◽
Chen-Chi Shing
◽
Meng Chu Chiang
◽
...
Keyword(s):
Security Risks
◽
Smartphone Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close