2018
DOI: 10.1016/j.future.2018.05.082
|View full text |Cite
|
Sign up to set email alerts
|

QRFence: A flexible and scalable QR link security detection framework for Android devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 54 publications
0
9
0
1
Order By: Relevance
“…The security and privacy issues of QR code scanners have been relatively well studied over the past few years [6][7][8][9], [15][16][17], [19][20][21][22][23][24][25][26][27][28][29]. We will briefly review the literature on the security and privacy of current QR code scanners.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The security and privacy issues of QR code scanners have been relatively well studied over the past few years [6][7][8][9], [15][16][17], [19][20][21][22][23][24][25][26][27][28][29]. We will briefly review the literature on the security and privacy of current QR code scanners.…”
Section: Related Workmentioning
confidence: 99%
“…Existing security techniques for detecting malicious QR links concentrate mostly on the security of the web browser. The efficiency and accuracy of the applications are entirely dependent on the capability of the browser and its malicious link detection method and plug-ins [24]. Nonetheless, the majority of these browsers rely on the blacklist approach, which is not the most effective means of identifying recently developed websites.…”
Section: Introductionmentioning
confidence: 99%
“…Reference [15] proposed a QR link security detection method for android devices. The authors' employed link characteristics with several permissions and achieved flexible and scalable results.…”
Section: Related Workmentioning
confidence: 99%
“…Kriptografi asimetris adalah sebuah algoritma yang kriptografi yang menggunakan 2 kunci yang berbeda untuk melakukan enkripsi dan dekripsi (Kittur and Pais, 2017), (Ani et al, 2011). Metode template matching juga handal untuk face detection (Çinar Akakin et al, 2006), (Wijanarko et al, 2017).…”
Section: Pendahuluanunclassified