2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) 2014
DOI: 10.1109/prisms.2014.6970599
|View full text |Cite
|
Sign up to set email alerts
|

Android encryption systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 5 publications
0
10
0
1
Order By: Relevance
“…Mobile platforms such as Android and iOS use several techniques to protect the integrity of the operating systems, isolate individual applications [18] and protect the data stored [19] on the device. Several papers assess [20] the security mechanisms included in these platforms or present additional mechanisms to further increase the security of the platform.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile platforms such as Android and iOS use several techniques to protect the integrity of the operating systems, isolate individual applications [18] and protect the data stored [19] on the device. Several papers assess [20] the security mechanisms included in these platforms or present additional mechanisms to further increase the security of the platform.…”
Section: Related Workmentioning
confidence: 99%
“…For storage encryption, the acceptable runtime is higher and may extend slightly higher than 1000ms. But note that the parameters used for scrypt in Android since version 4.4 [11] for storage encryption (namely (N, r, p) = (2 15 , 3, 1) [34]) yields moderate running times (around 100ms on server CPUs, but higher on typical mobile devices).…”
Section: Derivation Of Equivalent Parametersmentioning
confidence: 99%
“…For remote server login he proposes N = 2 14 , r = 8, p = 1, which uses 16 MB. Android since version 4.4 uses scrypt for storage encryption[11], with parameters (N, r, p) = (2 15 , 3, 1)[34].…”
mentioning
confidence: 99%
“…Researchers propose a generic architecture for providing security services in the cloud for smartphones within a corporate environment. P. Teufl et al [13] researched that high usability of smartphones and tablets by consumers as well as the corporate and public sector. The researchers proposed different encryption systems for android's that are assessed and their susceptibility to different attacks is analyzed in detail.…”
Section: Related Workmentioning
confidence: 99%