


default search action
4th MobiSec 2012: Frankfurt am Main, Germany
- Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 107, Springer 2012, ISBN 978-3-642-33391-0
Monday, 25 June 2012 (Day 1)
- Simon Meurer, Roland Wismüller:
APEFS: An Infrastructure for Permission-Based Filtering of Android Apps. 1-11 - Widura Schwittek, André Diermann, Stefan Eicker:
A Guidance Model for Architecting Secure Mobile Applications. 12-23 - Frank Morgner, Dominik Oepen, Wolf Müller, Jens-Peter Redlich:
Mobile Smart Card Reader Using NFC-Enabled Smartphones. 24-37 - Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:
Claim-Based versus Network-Based Identity Management: A Hybrid Approach. 38-50 - Andrew Walenstein, Luke Deshotels, Arun Lakhotia:
Program Structure-Based Feature Selection for Android Malware Analysis. 51-52 - Alexandre Melo Braga, Erick N. Nascimento, Lucas R. Palma:
Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments. 53-54 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Scalable Trust Assessment and Remediation of Wireless Devices. 55-56
Tuesday, 26 June 2012 (Day 2)
- Jack Brassil, Pratyusa K. Manadhata:
Verifying the Location of a Mobile Device User. 57-68 - Denis Feth, Christian Jung
:
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments. 69-80 - Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien:
Securing Mobile Device-Based Machine Interactions with User Location Histories. 81-92 - Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri:
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing. 93-106 - Mads Schaarup Andersen, Mikkel Baun Kjærgaard
, Kaj Grønbæk
:
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. 107-118 - Kalpana Singh, Jian Zhong, Vinod Mirchandani, Lynn Margaret Batten, Peter Bertók
:
Securing Data Privacy on Mobile Devices in Emergency Health Situations. 119-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.