Contextaware usage control for android, Security and Privacy in Communication Networks, pp.326-343, 2010. ,
DOI : 10.1007/978-3-642-16161-2_19
NIST SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, 2013. ,
secure password managers " and " militarygrade encryption " on smartphones: Oh, really?, 2012. ,
Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011. ,
DOI : 10.1145/1999995.2000018
TaintDroid, Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pp.1-6, 2010. ,
DOI : 10.1145/2619091
Hey, You, Get Off of My Clipboard, Proceedings of the 17th International Conference on Financial Cryptography and Data Security, 2013. ,
DOI : 10.1007/978-3-642-39884-1_12
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments, Security and Privacy in Mobile Information and Communication Systems, pp.69-80, 2012. ,
DOI : 10.1007/978-3-642-21599-5_7
Towards unified authorization for android, Engineering Secure Software and Systems, pp.42-57, 2013. ,
Semantically Rich Application-Centric Security in Android, 2009 Annual Computer Security Applications Conference, pp.658-673, 2012. ,
DOI : 10.1109/ACSAC.2009.39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.9444
Progressive authentication: deciding when to authenticate on mobile phones, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.15-15 ,
Mobile Device Encryption Systems, Proceedings of the 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, p.15, 2013. ,
DOI : 10.4236/jis.2010.12009
URL : https://hal.archives-ouvertes.fr/hal-01463828
Context-centric security, Proceedings of the 7th USENIX conference on Hot Topics in Security, HotSec'12, pp.9-9 ,
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?, 2012 IEEE 28th International Conference on Data Engineering Workshops, pp.251-254, 2012. ,
DOI : 10.1109/ICDEW.2012.81