2015
DOI: 10.1109/mprv.2015.67
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 7 publications
0
2
0
1
Order By: Relevance
“…Se han de discriminar dos dominios; el uno en cuanto a las aplicaciones que operan en el teléfono móvil inteligente y por otra parte los privilegios y permisos para acceder a los datos dentro del dispositivo [11].…”
Section: Características Del Entornounclassified
“…Se han de discriminar dos dominios; el uno en cuanto a las aplicaciones que operan en el teléfono móvil inteligente y por otra parte los privilegios y permisos para acceder a los datos dentro del dispositivo [11].…”
Section: Características Del Entornounclassified
“…Similarly, the security approaches implemented for personal computers, such as desktops and laptops, may also be performed for mobile devices, such as smartphones. On the other hand, cell phones have a few distinguishing characteristics that lead to significant issues with ensuring their security [28]. For example, products designed for the general public, such as smartphones, are typically open platform systems with multiple entry points and central data management, making them vulnerable to theft and loss.…”
Section: Introductionmentioning
confidence: 99%
“…This feature enables Android to be used anywhere and on any device. However, opensource software can be more vulnerable to malicious users and apps than closed proprietary platforms, and Android has accordingly suffered from various security threats in recent years, such as private data leaks [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%