2014 International Carnahan Conference on Security Technology (ICCST) 2014
DOI: 10.1109/ccst.2014.6987030
|View full text |Cite
|
Sign up to set email alerts
|

A framework along with guidelines for designing secure mobile enterprise applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The advancement of mobile technologies and the resultant rise in the use of mobile applications (apps) over the past decade has resulted in the ubiquitous use of these technologies (Hasan, Gómez, & Kurzhöfer, 2013;Hoos, Gröger, Kramer, & Mitschang, 2015). Other evidence of this shift in mobile technology adoption is that mobile traffic was set to grow to 52% of all website traffic in 2018, up from 50.3% in 2017 (Statisa, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…The advancement of mobile technologies and the resultant rise in the use of mobile applications (apps) over the past decade has resulted in the ubiquitous use of these technologies (Hasan, Gómez, & Kurzhöfer, 2013;Hoos, Gröger, Kramer, & Mitschang, 2015). Other evidence of this shift in mobile technology adoption is that mobile traffic was set to grow to 52% of all website traffic in 2018, up from 50.3% in 2017 (Statisa, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, 800 & 600 pixels of BMP pictures don't seem to be typically used on the web and will cause suspicion. LSB steganography has so additionally been developed to be employed in alternative image file formats [8,9].…”
Section: A Lsb Algorithmmentioning
confidence: 99%
“…The data retrieval is confirmed as a result of the bits used for filtering doesn't seem to be modified, inferring that the filter can choose an equivalent bits throughout the concealment method. It's the foremost economical technique to cover data [8,9].…”
Section: B Slsb Algorithmmentioning
confidence: 99%