Results 181 to 190 of about 8,962 (209)
Some of the next articles are maybe not open access.
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), 2012
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 ...
Ruben Jonathan Garcia Vargas +3 more
openaire +1 more source
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 ...
Ruben Jonathan Garcia Vargas +3 more
openaire +1 more source
Security implications of Android
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011Smartphones blur the boundaries between the traditional feature phone and a general purpose computer such as a laptop. The Android OS, from Google, was created to be an open alternative to fully closed platforms such as Apple's iOS or Microsoft's Windows Phone OS.
openaire +1 more source
Android vulnerabilities and security
2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 2017Market share of Android device is increasing and these devices are now important part of one's daily routine. Most of our sensative data is stored in these devcies. This paper focuses on various vulnerabilities which an Android user might be exposed to and ways protect themselves from these vulnerabilities.
Saurav Yadav +4 more
openaire +1 more source
2012
In Chapter 2, we looked at a simple example of how we can protect information using encryption. However, that example did not make use of Android’s built-in security and permissions architecture. In this chapter, we will take a look at what Android is able to offer the developer and end user with regard to security.
openaire +1 more source
In Chapter 2, we looked at a simple example of how we can protect information using encryption. However, that example did not make use of Android’s built-in security and permissions architecture. In this chapter, we will take a look at what Android is able to offer the developer and end user with regard to security.
openaire +1 more source
Learning mobile security with android security labware
Proceeding of the 44th ACM technical symposium on Computer science education, 2013As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or explored in the mobile computing paradigm where traditional security threats are also evolving.
Minzhe Guo +4 more
openaire +1 more source
Securing Android Phones against Potential Thefts: AhMyth Android RAT
2020Android Smartphones have become an everyday companion for the modern man. Day by day, new improved versions of phones are being introduced into the market. Everyone who owns a smartphone adds more personal data on it daily. Therefore there is a bigger need to secure these devices.
Lisha Varghese +3 more
openaire +1 more source
Android applications and security breach
2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), 2016The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding.
Diana Gabriela Noemi Benitez-Mejia +2 more
openaire +1 more source
Android Security and Permissions
2015The fact that you are reading this book, and are thinking of developing applications for Android, means you have certainly been exposed to ongoing security issues that are an inescapable fact of modern operating systems and programs. Catchy names like Heartbleed and Shellshock have brought security to the forefront of even nontechnical consumers ...
openaire +1 more source
WSafe – Security Android Application
The usage of smart phones equipped with GPS navigation unit have increased rapidly from 3% to more than 20% in the past five years. Hence, a smart phone can be used efficiently for personal safety or various other protection purposes especially for women. This app can be activated by a single click when the user feels she is in danger. This applicationLakde, Divya +4 more
openaire +1 more source
Comparative analysis of Android and iOS from security viewpoint
Computer Science Review, 2021Shivi Garg, Niyati Baliyan
exaly

