Trust and confidence in open systems: does security harmonize with mobility?
Abstract
References
Recommendations
Challenges of using mobile devices in process industry
APCHI '13: Proceedings of the 11th Asia Pacific Conference on Computer Human InteractionAlmost everyone today owns some type of mobile device that is not only being used for routine tasks such as making phone calls, but also for more advanced tasks such as social networking. Advances in hardware technology have seen the cost of mobile ...
A Secure Protocol for Traffic Police Mobile Communication System
ICFCC '09: Proceedings of the 2009 International Conference on Future Computer and CommunicationThe advance of wireless networking, communication, and mobile technology is making a big impact to daily life. Mobile devices, such as cell phones, and PDAs are becoming more popular each day. The large number of mobile users along with the ubiquitous ...
Guest Editors' Introduction: Mobile Device Security
Now that handheld devices are ubiquitous and powerful enough to be considered personal computers, they're an attractive target for hacking and misuse. The guest editors of this special issue brought together a set of articles that describe challenges ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 486Total Downloads
- Downloads (Last 12 months)21
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in