"
iPhone Security Analysis"
written by Vaibhav Ranchhoddas Pandya, Mark Stamp,
published by
Journal of Information Security,
Vol.1 No.2, 2010
has been cited by the following article(s):
[1]
|
Digital Forensics Security Analysis on iOS Devices
|
|
2021 |
|
|
[2]
|
SoK: Untangling File-based Encryption on Mobile Devices
|
|
arXiv preprint arXiv:2111.12456,
2021 |
|
|
[3]
|
Is Every Application That Are Using In Mobiles Are Secure?
|
|
IJSART,
2020 |
|
|
[4]
|
시나리오 기반의 스마트폰 취약점에 대한 보안방안
|
|
2018 |
|
|
[5]
|
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
|
|
International Journal of E-Services and Mobile Applications (IJESMA),
2018 |
|
|
[6]
|
시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구
|
|
2018 |
|
|
[7]
|
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
|
|
ICT Systems Security and Privacy Protection,
2015 |
|
|
[8]
|
Crypto-Bootloader–Secure in-field firmware updates for ultra-low power MCUs
|
|
2015 |
|
|
[9]
|
A Summer Internship Project Report On Enhancing Database Security in Android Devices Carried out at the Institute for Development and Research in Banking Technology During 12th May-14th July 2014
|
|
2014 |
|
|
[10]
|
iOS 系统安全和口令破解研究
|
|
安阳师范学院学报,
2014 |
|
|
[11]
|
Android Encryption Systems
|
|
2014 |
|
|
[12]
|
An evaluation of smartphone communication (in) security
|
|
Thesis,
2014 |
|
|
[13]
|
iOS 系统数据安全分析与加固
|
|
通信技术,
2014 |
|
|
[14]
|
Smartphone privacy perceptions and behaviors generational influence quantitative analysis: Communications privacy management theory
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[15]
|
Anomaly-based intrusion detection and prevention systems for mobile devices: Design and development
|
|
2013 |
|
|
[16]
|
iOS encryption systems: Deploying iOS devices in security-critical environments
|
|
Security and Cryptography (SECRYPT), 2013 International Conference on,
2013 |
|
|
[17]
|
Mobile Device Encryption Systems
|
|
Security and Privacy Protection in Information Processing Systems,
2013 |
|
|
[18]
|
iOS Encryption Systems
|
|
2013 |
|
|
[19]
|
SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol
|
|
Software: Practice and Experience,
2012 |
|
|
[20]
|
PROPUESTA PARA TRABAJO DE GRADO
|
|
2012 |
|
|
[21]
|
iOS 系统数据安全研究
|
|
信息安全与通信保密,
2012 |
|
|
[22]
|
Exploration of attacks on current generation smartphones
|
|
Procedia Computer Science,
2011 |
|
|
[23]
|
Τεχνικ? Σ?γκριση Λειτουργικ?ν Συστημ?των Apple iOS και Google Android
|
|
2011 |
|
|
[24]
|
iSAM: an iPhone stealth airborne malware
|
|
Future Challenges in Security and Privacy for Academia and Industry,
2011 |
|
|
[25]
|
David Bayne Cluster 4 August 1, 2011
|
|
2011 |
|
|
[26]
|
Securing the use of sensitive data on remote devices using a hardware-software architecture
|
|
2010 |
|
|
[1]
|
Information Systems Management [Working Title]
2023
DOI:10.5772/intechopen.109652
|
|
|
[2]
|
Information Systems Management
2023
DOI:10.5772/intechopen.109652
|
|
|
[3]
|
ICT Systems Security and Privacy Protection
IFIP Advances in Information and Communication Technology,
2015
DOI:10.1007/978-3-319-18467-8_37
|
|
|
[4]
|
SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol
Software: Practice and Experience,
2014
DOI:10.1002/spe.2170
|
|
|
[5]
|
SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol
Software: Practice and Experience,
2014
DOI:10.1002/spe.2170
|
|
|
[6]
|
Android encryption systems
2014 International Conference on Privacy and Security in Mobile Systems (PRISMS),
2014
DOI:10.1109/PRISMS.2014.6970599
|
|
|
[7]
|
Security and Privacy Protection in Information Processing Systems
IFIP Advances in Information and Communication Technology,
2013
DOI:10.1007/978-3-642-39218-4_16
|
|
|
[8]
|
Document Management System Mobility – Main Trend in Future Document Management
International Journal of Computer and Communication Engineering,
2013
DOI:10.7763/IJCCE.2013.V2.236
|
|
|
[9]
|
Exploration of Attacks on Current Generation Smartphones
Procedia Computer Science,
2011
DOI:10.1016/j.procs.2011.07.071
|
|
|