


default search action
Pervasive and Mobile Computing, Volume 32
Volume 32, October 2016
- Kim-Kwang Raymond Choo

, Lior Rokach, Claudio Bettini
:
Mobile security and privacy: Advances, challenges and future research directions. 1-2 - Zhaoguo Wang

, Chenglong Li, Zhenlong Yuan, Yi Guan, Yibo Xue:
DroidChain: A novel Android malware detection method based on behavior chains. 3-14 - Jun Song

, Chunling Han, Kaixin Wang, Jian Zhao, Rajiv Ranjan
, Lizhe Wang
:
An integrated static detection and analysis framework for android. 15-25 - Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera

, Yazan Boshmaf, Konstantin Beznosov:
Decoupling data-at-rest encryption and smartphone locking with wearable devices. 26-34 - Anat Hovav, Frida Ferdani Putri:

This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy. 35-49 - Ahmed Mahfouz, Ildar Muslukhov, Konstantin Beznosov:

Android users in the wild: Their authentication and usage behavior. 50-61 - Bahman Rashidi

, Carol J. Fung, Tam Vu:
Android fine-grained permission control system with real-time expert recommendations. 62-77 - Rinku Dewri, Ramakrishna Thurimella:

Mobile local search with noisy locations. 78-92 - Idalides J. Vergara-Laurens, Diego Mendez

, Luis Gabriel Jaimes, Miguel A. Labrador:
A-PIE: An algorithm for preserving privacy, quality of information, and energy consumption in Participatory Sensing Systems. 93-112

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














