Usable Mobile Security

被引:0
|
作者
Asokan, N. [1 ]
Kuo, Cynthia [1 ]
机构
[1] Nokia Res Ctr, Espoo, Finland
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [21] Usable Security history, themes, and challenges
    Garfnkel, Simson
    Lipford, Heather Richter
    Synthesis Lectures on Information Security, Privacy, and Trust, 2014, 5 (02): : 1 - 166
  • [22] Making security usable: Are things improving?
    Furnell, Steuen
    COMPUTERS & SECURITY, 2007, 26 (06) : 434 - 443
  • [23] The Mobile Application Framework: Making mobile links usable
    Hild, SG
    Robinson, P
    1996 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - CONVERGING TECHNOLOGIES FOR TOMORROW'S APPLICATIONS, VOLS. 1-3, 1996, : 1386 - 1390
  • [24] Disinformation and Reflections From Usable Security
    Zurko, Mary Ellen
    IEEE Security and Privacy, 2022, 20 (03): : 4 - 7
  • [25] Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    Rahman, Farzana
    Gani, Md Osman
    Ahsan, Golam Mushih Tanimul
    Ahamed, Sheikh Iqbal
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 121 - 129
  • [26] Ubiquitous Security - Challenges and Opportunities for Usable Security in the Ubicomp Age
    Alt, Florian
    2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2018,
  • [27] Privacy in mobile usable Construction Software
    不详
    BAUINGENIEUR, 2014, 89 : A10 - A10
  • [28] Usable Privacy for Mobile Sensing Applications
    Christin, Delphine
    Engelmann, Franziska
    Hollick, Matthias
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 92 - 107
  • [29] Game theoretical analysis of usable security and privacy
    Justine, Cynara
    Prasad, Rendhir R.
    Thomas, Ciza
    SECURITY AND PRIVACY, 2021, 4 (05):
  • [30] Achieving usable security in a project driven industry
    Luehr, Jan
    2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2018,