Mobile Device Encryption Systems

Conference object English OPEN
Teufl , Peter; Zefferer , Thomas; Stromberger , Christof;

Part 4: Software Security; International audience; The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typ... View more
  • References (13)
    13 references, page 1 of 2

    1. Apple: iOS Security. Tech. Rep. May, Apple Inc. (2012), com/ipad/business/docs/iOS\_Security\_May12.pdf

    2. Belenko, A., Sklyarov, D.: Evolution of iOS Data Protection and iPhone Forensics : from iPhone OS to iOS 5 (2011)

    3. Chen, Y.C.Y., Ku, W.S.K.W.S.: Self-Encryption Scheme for Data Security in Mobile Devices (2009), arnumber=4784733

    4. Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security (2009),

    5. Goadrich, M.H., Rogers, M.P.: Smart Smartphone Development : iOS versus Android. Science Education pp. 607{612 (2011), id=1953330

    6. Heider, J., Khayari, R.E.: iOS Keychain Weakness FAQ - Further Information on iOS Password Protection (2012), sc-iphone-passwords-faq.pdf

    7. Kaliski, B.: PKCS #5: Password-Based Cryptography Speci cation Version 2.0 (2000),

    8. Pacatilu, P.: Android Applications Security. Informatica Economica 15(3), 163{171 (2011),\&db=bth\&AN= 69706020\&site=ehost-live

    9. Pandya, V.R.: IPHONE SECURITY ANALYSIS. Journal of Information Security 1(May), 74{87 (2008), aspx?DOI=10.4236/jis.2010.12009

    10. Paul, M., Chauhan, N.S., Saxena, A.: A security analysis of smartphone data ow and feasible solutions for lawful interception (2011), org/lpdocs/epic03/wrapper.htm?arnumber=6122788

  • Related Research Results (1)
  • Metrics
Share - Bookmark