Abstract is missing.
- Android Market Analysis with Activation PatternsPeter Teufl, Stefan Kraxberger, Clemens Orthacker, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber. 1-12 [doi]
- Gesture Authentication with Touch Input for Mobile DevicesYuan Niu, Hao Chen. 13-24 [doi]
- A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile UsersAlireza Behrooz, Alisa Devlic. 25-39 [doi]
- Android Security Permissions - Can We Trust Them?Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber. 40-51 [doi]
- Private Pooling: A Privacy-Preserving Approach for Mobile Collaborative SensingKevin Wiesner, Michael Dürr, Markus Duchon. 52-63 [doi]
- Agent Based Middleware for Maintaining User Privacy in IPTV Recommender ServicesAhmed M. Elmisery, Dmitri Botvich. 64-75 [doi]
- Privacy Enhanced Device AccessGeir M. Køien. 76-87 [doi]
- Energy Efficiency Measurements of Mobile Virtualization SystemsMarius Marcu, Dacian Tudor. 88-100 [doi]
- Digital Holography for Security ApplicationsRoberto Maurizio Pellegrini, Samuela Persia, Silvello Betti. 101-112 [doi]
- Formal Security Analysis of OpenID with GBA ProtocolAbu Shohel Ahmed, Peeter Laud. 113-124 [doi]
- Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?Mufajjul Ali. 125-135 [doi]
- Fingerprint Recognition with Embedded Cameras on Mobile PhonesMohammad Omar Derawi, Bian Yang, Christoph Busch. 136-147 [doi]
- Policy Driven Remote AttestationAnandha Gopalan, Vaibhav Gowadia, Enrico Scalavino, Emil Lupu. 148-159 [doi]
- ID-Based Deniable Authentication Protocol Suitable for Mobile DevicesJayaprakash Kar. 160-171 [doi]
- Mobile Security with Location-Aware Role-Based Access ControlNils Ulltveit-Moe, Vladimir A. Oleshchuk. 172-183 [doi]