Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments

10Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security has been more crucial issue as targets of attacker are wide ranges from personal information to various things in ubiquitous computing environments. Portable computing devices such as cellular phone, PDA, and smart phone in such conditions have been exposured under security threats, which cause attacker to exploit malicious code and modification of storied data. In this paper we present security threats and their countermeasures in technical, manageable, and physical aspect of mobile portable computing devices. We believe that this paper will contributes on initiating a research on security issues of mobile portable computing devices and provide users with guidance to keep their information safe in mobile communication environments. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kim, S. H., & Leem, C. S. (2005). Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments. In Lecture Notes in Computer Science (Vol. 3483, pp. 79–85). Springer Verlag. https://doi.org/10.1007/11424925_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free