default search action
Pervasive and Mobile Computing, Volume 32
Volume 32, October 2016
- Kim-Kwang Raymond Choo, Lior Rokach, Claudio Bettini:
Mobile security and privacy: Advances, challenges and future research directions. 1-2 - Zhaoguo Wang, Chenglong Li, Zhenlong Yuan, Yi Guan, Yibo Xue:
DroidChain: A novel Android malware detection method based on behavior chains. 3-14 - Jun Song, Chunling Han, Kaixin Wang, Jian Zhao, Rajiv Ranjan, Lizhe Wang:
An integrated static detection and analysis framework for android. 15-25 - Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, Konstantin Beznosov:
Decoupling data-at-rest encryption and smartphone locking with wearable devices. 26-34 - Anat Hovav, Frida Ferdani Putri:
This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy. 35-49 - Ahmed Mahfouz, Ildar Muslukhov, Konstantin Beznosov:
Android users in the wild: Their authentication and usage behavior. 50-61 - Bahman Rashidi, Carol J. Fung, Tam Vu:
Android fine-grained permission control system with real-time expert recommendations. 62-77 - Rinku Dewri, Ramakrishna Thurimella:
Mobile local search with noisy locations. 78-92 - Idalides J. Vergara-Laurens, Diego Mendez, Luis Gabriel Jaimes, Miguel A. Labrador:
A-PIE: An algorithm for preserving privacy, quality of information, and energy consumption in Participatory Sensing Systems. 93-112
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.