BYOD security engineering: A framework and its analysis

N Zahadat, P Blessner, T Blackburn, BA Olson - Computers & Security, 2015 - Elsevier
With the rapid increase of smartphones and tablets, security concerns have also been on the
rise. Employees find it desirable to use personal mobile devices for their work and make no …

[PDF][PDF] Guidelines on cell phone and PDA security

W Jansen, K Scarfone - NIST Special publication, 2008 - csrc.nist.rip
Cell phones and personal digital assistants (PDAs) have become indispensable tools for
today's highly mobile workforce. Small and relatively inexpensive, these devices can be …

A location-based mechanism for mobile device security

W Jansen, V Korolev - 2009 WRI world congress on computer …, 2009 - ieeexplore.ieee.org
While mobile handheld devices, such as cell phones and PDAs, provide productivity
benefits, they also pose new risks. A vital safeguard against unauthorized access to a …

SecureMyDroid: enforcing security in the mobile devices lifecycle

A Distefano, A Grillo, A Lentini, GF Italiano - Proceedings of the Sixth …, 2010 - dl.acm.org
Due to the extensive growth and diffusion of mobile devices (eg, Smartphone, PDAs, mobile
phones, etc.), and to their powerful capabilities, many users are massively using mobile …

Security observance throughout the life-cycle of embedded systems

SH Mirjalili, AK Lenstra - Proceedings of the 2008 International …, 2008 - infoscience.epfl.ch
Embedded systems are an established part of life. Their security requirements underline the
importance of properly formulated, implemented, and enforced security policies throughout …

Security of smartphones at the dawn of their ubiquitousness

M Becher - None, 2009 - madoc.bib.uni-mannheim.de
The importance of researching in the field of smartphone security is substantiated in the
increasing number of smartphones, which are expected to outnumber common computers in …

Automatic QoE prediction in stereoscopic videos

H Malekmohamadi, WAC Fernando… - … on Multimedia and …, 2012 - ieeexplore.ieee.org
In this paper, we propose a method for automatic quality of experience (QoE) prediction in
stereoscopic videos. QoE, though embodying the subjective measures of the end user's …

Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and …

N Zahadat - 2016 - search.proquest.com
With the rapid increase of smartphones and tablets, security concerns have also been on the
rise. Traditionally, Information Technology (IT) departments set up devices, apply security …

[หนังสือ][B] Guidelines on cell phone and PDA security: recommendations of the National Institute of Standards and Technology

W Jansen - 2009 - books.google.com
Cell phones and Personal Digital Assistants (PDAs) have become indispensable tools for
today¿ s highly mobile workforce. Small and relatively inexpensive, these devices can be …

[PDF][PDF] Tapi: touch-screen authentication using partitioned images

J Citty, DR Hutchings - Elon University, Citeseer, 2010 - facstaff.elon.edu
We describe and evaluate an alternative approach to a personal identification number (PIN)
for small touch-screen devices named TAPI. TAPI replaces a 4-digit sequence with a …