Security analysis of smartphone and cloud computing authentication frameworks and protocols

Z Siddiqui, O Tayan, MK Khan - IEEE Access, 2018‏ - ieeexplore.ieee.org
We live in a digital world where every detail of our information is being transferred from one
smart device to another via cross-platform, third-party cloud services. Smart technologies …

[كتاب][B] Smartphones within psychological science

DA Ellis - 2020‏ - books.google.com
Psychologists can now quantify behaviours beyond the laboratory using a mass-adopted,
unified system that is primed for data capture aka smartphones. This is the first book to bring …

[PDF][PDF] The Design and Development of Mobile Game to Promote Secure Smartphone Behaviour.

A Ganesh, C Ndulue, R Orji - BCSS@ PERSUASIVE, 2021‏ - ceur-ws.org
Smartphones have evolved significantly in different ways over the years. Currently, Android
and iOS dominate the market, followed by other operating systems. Along with the evolution …

A Comparative Analysis of Smartphone Security Behaviors and Practices.

A Chin, B Jones, P Little - International Journal of Education and Development …, 2021‏ - ERIC
This study on smartphone security behaviors and practices is a continuation of the work in
Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive …

Advance Security Schemes for Smart Societies

M Joshi, B Mazumdar, S Dey - Green Technological Innovation for …, 2021‏ - Springer
Internet technology has become a boon to humans as it transformed our way of thinking and
changed our way of living. What looked like a scene from a sci-fi movie has become a reality …

Consideraciones de seguridad para el comercio electrónico en dispositivos móviles inteligentes

D Ponce, R Cedeño - Brazilian Journal of Development, 2024‏ - ojs.brazilianjournals.com.br
El comercio electrónico en entornos móviles tiene más de tres décadas de investigación y
desarrollo. Sin embargo, los cambios tecnológicos hacia redes de telecomunicaciones de …

Metodología para la selección de herramientas eficientes y protocolos adecuados para mejorar la seguridad de los dispositivos móviles

DM Erreyes Pinzón - 2017‏ - dspace.ucuenca.edu.ec
Currently there are tools to protect the information contained in mobile devices, many users
are unaware of the risks involved in not using the appropriate protection measures; On the …

SCEAMS: Secure corporate environment adhered to mobile & smartphones

DS Bhatti, NA Saqib, Z Anwar - 2016 Sixth International …, 2016‏ - ieeexplore.ieee.org
Due to increased use of smartphones in enterprise setup several security threats have also
been penetrated in it. Threats and risks become increased, especially when these …

Static Analysis of Android Programs for Malware Detection

A Maalouf - 2021‏ - search.proquest.com
Mobile devices access and manage data of critical importance to the end-user. The Android
platform uses a permission-based security model to protect the device's sensitive resources …