Title | ||
---|---|---|
A security analysis of smartphone data flow and feasible solutions for lawful interception. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/ISIAS.2011.6122788 | IAS |
Keywords | Field | DocType |
pki,law,encryption,escrow,data flow analysis,security,data flow,cryptography,security analysis | Public key infrastructure,Lawful interception,Internet privacy,Computer science,Cryptography,Computer security,Server,Encryption,Jurisdiction,Security analysis,Router | Conference |
Citations | PageRank | References |
1 | 0.38 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mithun Paul | 1 | 1 | 0.38 |
Nitin Singh Chauhan | 2 | 2 | 0.73 |
Ashutosh Saxena | 3 | 4575 | 227.88 |