Make my Phone Secure!: Using Gamification for Mobile Security Settings.
Mehrdad BahriniGeorg VolkmarJonas SchmutteNina WenigKarsten SohrRainer MalakaPublished in: Mensch & Computer (2019)
Keyphrases
- security requirements
- mobile phone
- security issues
- security level
- security measures
- mobile commerce
- security mechanisms
- key management
- factor authentication
- information security
- mobile agent system
- security protocols
- cryptographic protocols
- security management
- security analysis
- security patterns
- data encryption
- security model
- security architecture
- mobile payment
- security services
- sensitive data
- key exchange protocol
- stream cipher
- security properties
- authentication mechanism
- authentication protocol
- key distribution
- data security
- encryption scheme
- digital rights management
- user experience
- key agreement
- electronic voting
- mobile devices
- security policies
- access control
- key agreement protocol
- secure communication
- public key encryption
- mobile users
- unauthorized access
- digital signature scheme
- smart card
- user authentication
- key exchange
- mobile phone users
- identity management
- provably secure
- diffie hellman
- intrusion detection
- integrity verification
- key management scheme
- public key cryptosystem
- electronic payment
- trusted computing
- secret key
- rfid systems
- authentication scheme
- private key
- secure multiparty computation
- secure routing
- previously mentioned
- cloud computing
- remote server
- elliptic curve
- advanced encryption standard
- mobile services
- public key
- network security
- mobile agents