SlideShare a Scribd company logo
3/1/2014 IEEE Xplore Abstract (Keywords) - Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms
http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?reload=true&arnumber=6357189 1/2
IEEE.org |  IEEE Xplore Digital Library |  IEEE Standards |  IEEE Spectrum |  More Sites
 
Sign Out
Access provided by:
Sree Vidyanikethan Engineering
College
Browse Journals & Magazines > Mobile Computing, IEEE Transa ...> Volume:13 Issue:1 
Design and Implementation of Efficient
Integrity Protection for Open Mobile
Platforms
Full Text
Sign­In or Purchase
3Author(s)
Tweet
0
Share
INSPEC: CONTROLLED INDEXING
cellular radio
smart phones
telecommunication security
INSPEC: NON CONTROLLED
INDEXING
Linux­based smartphone
cellular phone
efficient integrity protection
mobile device
open mobile operating system
simple integrity protection rule
trusted resource
trusted service
AUTHOR KEYWORDS
Bluetooth
Integrity protection
Malware
Mobile communication
Mobile computing
Smart phones
open mobile platforms
smartphone security
IEEE TERMS
Bluetooth
Malware
Mobile communication
Mobile computing
Smart phones
Sign In  |  Create Account
IEEE Account
Change Username/Password
Purchase Details
Payment Options
Profile Information
Communications Preferences
Need Help?
US & Canada: +1 800 678 4333
Cart (0) | Create Account | Sign In
 
Xinwen Zhang ; Huawei Res. Center, Santa Clara, CA, USA ; Seifert, J.­P. ; Aciicmez, O.
Abstract Authors References Cited By Metrics SimilarKeywords
3/1/2014 IEEE Xplore Abstract (Keywords) - Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms
http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?reload=true&arnumber=6357189 2/2
Update Address Order History
Access Purchased Documents
Profession and Education
Technical Interests
Worldwide: +1 732 981 0060
Contact & Support
About IEEE Xplore  |  Contact  |  Help  |  Terms of Use  |  Nondiscrimination Policy  |  Site Map  |  Privacy & Opting Out of Cookies
A not­for­profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE ­ All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

More Related Content

What's hot

Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
Tirtha Mal
 
Updated Resume
Updated ResumeUpdated Resume
Introduction To IoT
Introduction To IoTIntroduction To IoT
Introduction To IoT
Wesley Eldridge
 
Nano Communication
Nano Communication Nano Communication
Nano Communication
Behnaz Motavali
 
The Next Generation of Application Security
The Next Generation of Application SecurityThe Next Generation of Application Security
The Next Generation of Application Security
SBWebinars
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Ecway Technologies
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's Perspective
Satria Ady Pradana
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
whitecryption
 
Lessons learned for internet of things
Lessons learned for internet of thingsLessons learned for internet of things
Lessons learned for internet of things
Tegar Imansyah
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1
HK IT solutions... unlimited...
 

What's hot (11)

Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Updated Resume
Updated ResumeUpdated Resume
Updated Resume
 
Introduction To IoT
Introduction To IoTIntroduction To IoT
Introduction To IoT
 
Nano Communication
Nano Communication Nano Communication
Nano Communication
 
The Next Generation of Application Security
The Next Generation of Application SecurityThe Next Generation of Application Security
The Next Generation of Application Security
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's Perspective
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Lessons learned for internet of things
Lessons learned for internet of thingsLessons learned for internet of things
Lessons learned for internet of things
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1
 

Similar to Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms

Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
Tonex
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
IAEME Publication
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
IJCSIS Research Publications
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
PrinceGupta789219
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
IJCNCJournal
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
chiportal
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Muhammad Ahad
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
IJNSA Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
IJNSA Journal
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
Mark Skilton
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
IJEACS
 

Similar to Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms (20)

Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 

Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms

  • 1. 3/1/2014 IEEE Xplore Abstract (Keywords) - Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?reload=true&arnumber=6357189 1/2 IEEE.org |  IEEE Xplore Digital Library |  IEEE Standards |  IEEE Spectrum |  More Sites   Sign Out Access provided by: Sree Vidyanikethan Engineering College Browse Journals & Magazines > Mobile Computing, IEEE Transa ...> Volume:13 Issue:1  Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms Full Text Sign­In or Purchase 3Author(s) Tweet 0 Share INSPEC: CONTROLLED INDEXING cellular radio smart phones telecommunication security INSPEC: NON CONTROLLED INDEXING Linux­based smartphone cellular phone efficient integrity protection mobile device open mobile operating system simple integrity protection rule trusted resource trusted service AUTHOR KEYWORDS Bluetooth Integrity protection Malware Mobile communication Mobile computing Smart phones open mobile platforms smartphone security IEEE TERMS Bluetooth Malware Mobile communication Mobile computing Smart phones Sign In  |  Create Account IEEE Account Change Username/Password Purchase Details Payment Options Profile Information Communications Preferences Need Help? US & Canada: +1 800 678 4333 Cart (0) | Create Account | Sign In   Xinwen Zhang ; Huawei Res. Center, Santa Clara, CA, USA ; Seifert, J.­P. ; Aciicmez, O. Abstract Authors References Cited By Metrics SimilarKeywords
  • 2. 3/1/2014 IEEE Xplore Abstract (Keywords) - Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?reload=true&arnumber=6357189 2/2 Update Address Order History Access Purchased Documents Profession and Education Technical Interests Worldwide: +1 732 981 0060 Contact & Support About IEEE Xplore  |  Contact  |  Help  |  Terms of Use  |  Nondiscrimination Policy  |  Site Map  |  Privacy & Opting Out of Cookies A not­for­profit organization, IEEE is the world's largest professional association for the advancement of technology. © Copyright 2014 IEEE ­ All rights reserved. Use of this web site signifies your agreement to the terms and conditions.