References
- AxVoice. (2012.May.10). [Online]. Available: http:// blog.axvoice.com/us-telecom-industry-from-2010-to-2015-a-research-by-axvoice/
- Talkatone. (2014.May.7). [Online]. Available: http:// support.talkatone.com/customer/portal/articles/1410745-support-for-google-voice-ending-may-15-2014.
- Henry, Paul, and Hui Luo. "WiFi: what's next?." Communications Magazine, IEEE. Vol. 40, No. 12, pp. 66-72, Dec. 2002.
- Google Voice Wikipedia. [Online]. Available: http://en.wikipedia.org/wiki/Google_Voice
- Google Hangout.[Online]. Available: https://support.google.com/hangouts/
- Android Developer Site.[Online]. Available: http://developer.android.com/
- Felt, Adrienne Porter, et al., "Android permissions demystified," Proc. of the 18th ACM conference on Computer and communications security. ACM, 2011.
- Enck, William, et al., "TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones," Communications of the ACM, Vol. 57, No. 3, pp. 99-106, Mar. 2014. https://doi.org/10.1145/2494522
- Mulliner, Collin, et al., "PatchDroid: scalable thirdparty security patches for Android devices," Proc. of the 29th Annual Computer Security Applications Conference. ACM, 2013.
- Stewart, Joe. (2007.Aug.25). "DNS cache poisoningthe next generation," [Online]. Available: http://www.secureworks.com/ (2003).
- Fahl, Sascha, et al., "Why Eve and Mallory love Android: An analysis of Android SSL (in) security," Proc. of the 2012 ACM conference on Computer and communications security. ACM, 2012.
- Chasung Lim, Wookey Lee, and Tae-Chang Jo, "An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks," Journal of KIISE: Computing Practices and Letters, Vol. 16, No. 6, pp. 693-697, Jun. 2010.
- Schneier, Bruce, "Two-factor authentication: too little, too late," Commun. ACM 48.4 (2005): 136. https://doi.org/10.1145/1053291.1053327
- Chin, David H., "Touch-based authentication of a mobile device through user generated pattern creation," U.S. Patent No. 7,593,000. 22 Sep. 2009.
- Jeon, Woongryul, et al., "A practical analysis of smartphone security," Human Interface and the Management of Information. Interacting with Information. Springer Berlin Heidelberg, 2011. 311-320.
- Sung-Ryul Kim, "Copy Protection System for Android App using Public Key Infrastructure," Journal of Security Engineering, Vol. 9, No. 1, Feb. 2012.
- S. Blake-Wilson, et al., "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)," RFC4492, May (2006).
- Hu, Yih-Chun, Markus Jakobsson, and Adrian Perrig, "Efficient constructions for one-way hash chains," Applied Cryptography and Network Security, Springer Berlin Heidelberg, (2005).
- T. I. Song, S. H. Shin, S. H. Choong, "Development of Light-weight Secure Protocol based on Certification Message for Secure Commination of Mobile Devices," Proc. of the KIISE Korea Computer Congress 2011, pp. 152-155, 2011. (in Korean)
- S. Y. Lee, J. K. Park, S. D. Hong, H. K. Choi, "Google Voice Hacks : Study on the Improvement about User Authentication Mechanism in Android Device," Proc. of the KIISE Korea Computer Congress 2014, pp. 949-951, 2014. (in Korean)
Cited by
- A study on novel filtering and relationship between input-features and target-vectors in a deep learning model for stock price prediction vol.49, pp.3, 2019, https://doi.org/10.1007/s10489-018-1308-x