22 research outputs found
Quantifying the effects of more timely certificate revocation on lightweight mobile devices
10.1109/Metrisec.2011.17Proceedings - 2011 3rd International Workshop on Security Measurements and Metrics, Metrisec 201131-4
Extending BAN logic for reasoning with modern PKI-based protocols
10.1109/NPC.2008.86Proceedings - 2008 IFIP International Conference on Network and Parallel Computing, NPC 2008190-19
Trusted principal-hosted certificate revocation
10.1007/978-3-642-22200-9_15IFIP Advances in Information and Communication Technology358 AICT173-18
Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN364-36924
Establishing software integrity trust: A survey and lightweight authentication system for windows
10.4018/978-1-61520-682-7.ch004Trust Modeling and Management in Digital Environments: From Social Concept to System Development78-10
A lightweight binary authentication system for windows
10.1007/978-0-387-09428-1_19IFIP International Federation for Information Processing263295-31
Idea: Benchmarking Android Data Leak Detection Tools
Virtual application stores for mobile platforms contain many malign and benign applications that exhibit security issues, such as the leaking of sensitive data. In recent years, researchers have proposed a myriad of techniques and tools to detect such issues automatically. However, it is unclear how these approaches perform compared to each other. The tools are often no longer available, thus comparing different approaches is almost infeasible