Comparative Study of Smart Phone Security Techniques

نویسنده

  • Pritam R. Tarle
چکیده

Day by day, smart phones are becoming an integral part of various fields in our life. The increased use of smart phones has raised the issue of security of data stored in android smart phones. Various techniques have been suggested for securing data stored on smart phones. Many of them fall in the category of android extensions i.e. making changes in the android operating system. While in some solutions, mobile virtualization technique is used. This paper gives a brief review of android security solutions implemented using android extensions as well as mobile

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Personality Types as Correlate of Specific Phone Usages and Smart Phone Addiction among Students in the University of Ilorin, Kwara State, Nigeria

Past researchers have examined the impact of personality types on technology usage among students from varying angles. However, due to dearth of studies on personality types and smart phone addiction among students in the Nigerian environment, this study investigated the relationship between personality types, smart phone addiction and specific phone usages among University students. A sample s...

متن کامل

Analysis and Security measures of Malware in Mobile device

New mobile technologies are growing rapidly. Smart phones and iPhones has added new dimensions in the field of mobile technology. It is used not only for conversation but also to carry data. The various features of Smartphone are Wi-Fi, touch-screen, SMS, digital camera, games, various apps, GPS system, mobile browsing, multi-tasking, support for 3-party software along with the basic features o...

متن کامل

Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community fo...

متن کامل

Smart phone Acceptance among physicians: Application of structural equation modeling in Iranian largest university

Background: The present study aimed to determine attitudes and effective factors in the acceptance of smart phones by physicians of the largest University of Medical Sciences in the south of Iran.Methods: This cross-sectional study was performed using Structural Equation Modelling (SEM) in 2014. Study participants included 200 physicians working in the hospitals of Shiraz University of Medical ...

متن کامل

Display Registration Smart Phone Interaction with Registered Displays

I magine standing in front of a real estate agent’s shop window one evening. Looking at the computer driven display in the window, you see several interesting properties. You want to download the related information and leave your details so the staff can contact you to arrange viewings. You also want to scroll through the other properties, using all the features of the large public display. Of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015