Amanote Research
Register
Sign In
How to Withstand Mobile Virus Attacks, Revisited
doi 10.1145/2611462.2611474
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2014
Authors
Joshua Baron
Karim El Defrawy
Joshua Lampkins
Rafail Ostrovsky
Publisher
ACM Press
Related search
How to Prevent AS Hijacking Attacks
A Methodology to Counter DoS Attacks in Mobile IP Communication
Mobile Information Systems
Computer Networks
Computer Science Applications
Communications
Resisting Collapse: How Matter Inside a Black Hole Can Withstand Gravity
Physical Review D
Astronomy
Physics
BK Virus Nephropathy Revisited
American Journal of Transplantation
Transplantation
Allergy
Immunology
Pharmacology
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
Software
Sender-Equivocable Encryption Schemes Secure Against Chosen-Ciphertext Attacks Revisited
International Journal of Applied Mathematics and Computer Science
Detecting Spoofing Attacks in Mobile Wireless Environments
How to Avoid Using the Regularity Lemma: Pósa’s Conjecture Revisited
Discrete Mathematics
Combinatorics
Theoretical Computer Science
Discrete Mathematics
How to Build Mobile Applications With Adaptive Architecture
International Journal of Software Engineering and its Applications
Software