Security Elements in Distributed Mobile Architectures
Abstract
Keywords
Full Text:
PDFReferences
Facebook. Facebook Mobile: 100 Million and Growing. https://www.facebook.com/blog/blog.php?post=297879717130 , accessed on 08.05.2013.
Catalin Boja, Mihai Doinea, Usability Vs. Security In Mobile Applications, Proceedings of the 12th International Conference on INFORMATICS in ECONOMY (IE 2013), Education, Research & Business Technologies, Bucharest, Romania, 2013, pp. 138-142
Gorumors. Most Accessed Social Network From Mobile Phones. http://gorumors.com/crunchies/most-accessed-social-network-from-mobile-phones/ , accessed on 08.05.2013.
Daniel Plohmann, Paul Imhoff. Localization (GPS, GSM, WLAN). XP Course, Universitaet Bonn, 2007.
Daniele Quercia, Neal Lathia, Francesco Calabrese, Giusy Di Lorenzo and Jon Crowcroft. Recommending Social Events from Mobile Phone Location Data. 2010.
Stéphane Distinguin, Pierre-Yves Platini and Amaury de Buchet. Social network websites: best practices from leading services. Fabernovel Consulting, 2007.
P. Mitra and K. Baid. Targeted advertising for online social networks. Department of Computer Science & Engineering, Indian Institute of Technology, 2009.
OAuth Group, OAuth 2.0 Protocol, http://oauth.net/2/
Refbacks
- There are currently no refbacks.
Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)