Practical Attacks on Security and Privacy Through a Low-Cost Android Device.
Greig PaulJames IrvinePublished in: J. Cyber Secur. Mobil. (2015)
Keyphrases
- low cost
- security mechanisms
- security issues
- security risks
- rfid tags
- security threats
- security measures
- security problems
- biometric template
- protection mechanisms
- security concerns
- information security
- countermeasures
- security protocols
- rfid systems
- personal data
- computer security
- cryptographic protocols
- data security
- statistical databases
- sensitive data
- malicious users
- security services
- information leakage
- security properties
- resource constrained
- network security
- security vulnerabilities
- cyber attacks
- security requirements
- access control
- privacy preserving
- authentication protocol
- privacy issues
- java card
- data privacy
- key management
- malware detection
- real time
- privacy concerns
- smart card
- buffer overflow
- chosen plaintext
- privacy preserving data mining
- intrusion detection
- privacy requirements
- security management
- privacy preservation
- security and privacy issues
- mobile devices
- data publishing
- stream cipher
- privacy protection
- personal information
- intrusion detection system
- sql injection