Abstract | ||
---|---|---|
Now a day's Smartphone has become most popular and dominant mobile device in this world for accessing internet resources. Smartphone is just like a minicomputer that created technological revolution after the internet. It is a portable electronic device with integrated functions like audio, video, Wi-Fi, GPS navigation, sensor, e-mail, web, camera and many more applications. However, due to poor access control policies and openness of android operating system it is necessary to study the challenges and prepare how to create a secure environment for mobile phones. In these days, security is the main issue for every Smartphone users. Authentication, confidentiality and integrity are three most desirable security features in a Smartphone. In this paper, mainly focus is on android attacks when user uses mobile phone and how to secure the data that transferred from android mobile phones. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2905055.2905214 | Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies |
DocType | ISBN | Citations |
Conference | 978-1-4503-3962-9 | 1 |
PageRank | References | Authors |
0.35 | 0 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vikash Singh | 1 | 1 | 0.35 |
Kavita Sharma | 2 | 6 | 3.25 |