Search Results

There are 14009 results for: content related to: Duth: a user-friendly dual-factor authentication for Android smartphone devices

  1. Enhancing malware detection for Android systems using a system call filtering and abstraction process

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1179–1192, Abdelfattah Amamra, Jean-Marc Robert and Chamseddine Talhi

    Version of Record online : 21 JUL 2014, DOI: 10.1002/sec.1073

  2. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  3. Introducing touchstroke: keystroke-based authentication system for smartphones

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 542–554, Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos and Emmanouil Pavlidakis

    Version of Record online : 1 JUL 2014, DOI: 10.1002/sec.1061

  4. CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5977–5995, J. Abdella, M. Özuysal and E. Tomur

    Version of Record online : 24 JAN 2017, DOI: 10.1002/sec.1750

  5. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3483–3495, Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham and Chamseddine Talhi

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1555

  6. Realization of a user-centric, privacy preserving permission framework for Android

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 368–382, Mohammad Nauman, Sohail Khan, Abu Talib Othman and Shahrulniza Musa

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.986

  7. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  8. Context data distribution with quality guarantees for Android-based mobile systems

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 450–460, Antonio Corradi, Mario Fanelli, Luca Foschini and Marcello Cinque

    Version of Record online : 27 DEC 2012, DOI: 10.1002/sec.633

  9. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Version of Record online : 1 SEP 2015, DOI: 10.1002/sec.1340

  10. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2813–2825, Zahid Anwar and Waqas Ahmad Khan

    Version of Record online : 9 FEB 2015, DOI: 10.1002/sec.1205

  11. An enhanced authentication protocol for WRANs in TV white space

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2267–2278, Cong Wang, Maode Ma and Zenghua Zhao

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1171

  12. 3S: three-signature path authentication for BGP security

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3002–3014, Yaping Liu, Wenping Deng, Zhihong Liu and Feng Huang

    Version of Record online : 18 FEB 2015, DOI: 10.1002/sec.1227

  13. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  14. Digital image steganalysis based on local textural features and double dimensionality reduction

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 729–736, Fengyong Li, Xinpeng Zhang, Hang Cheng and Jiang Yu

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1094

  15. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2338–2349, Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo and Lizhen Cui

    Version of Record online : 30 JAN 2015, DOI: 10.1002/sec.1179

  16. An enhanced security framework for reliable Android operating system

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 528–534, Jong Hyuk Park, Dohyun Kim, Ji Soo Park and Sangjin Lee

    Version of Record online : 13 NOV 2013, DOI: 10.1002/sec.908

  17. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  18. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  19. Semantically rich application-centric security in Android

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 658–673, Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.360

  20. Transactions based secure routing in wireless networks: a cognitive science approach

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1050–1062, R. Kumar and G. Kousalya

    Version of Record online : 11 AUG 2014, DOI: 10.1002/sec.1060