Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Smartphones' features are great, but with the power they provide, there's also a threat. Smartphones are becoming a target of attackers in the same way PCs have been for many years. This article examines the security models of two popular smart phone operating systems: Apple's iOS and Google's Android.