{"id":"https://openalex.org/W2084504193","doi":"https://doi.org/10.1109/prisms.2014.6970599","title":"Android encryption systems","display_name":"Android encryption systems","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2084504193","doi":"https://doi.org/10.1109/prisms.2014.6970599","mag":"2084504193"},"language":"en","primary_location":{"id":"doi:10.1109/prisms.2014.6970599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prisms.2014.6970599","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025432315","display_name":"Peter Teufl","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Peter Teufl","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049506045","display_name":"Andreas Fitzek","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Andreas Fitzek","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003471349","display_name":"Daniel Hein","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Hein","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073120610","display_name":"Alexander Marsalek","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Alexander Marsalek","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081200042","display_name":"Alexander Oprisnik","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Alexander Oprisnik","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057386847","display_name":"Thomas Zefferer","orcid":"https://orcid.org/0000-0001-5037-0657"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thomas Zefferer","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, 8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025432315"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":2.6202,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90619213,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6899463534355164},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6851347088813782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6758863925933838},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6331622004508972},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5822381973266602},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5233346819877625},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.5171029567718506},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5152259469032288},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.42718666791915894},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4124550521373749},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.32618653774261475},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.30084002017974854},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.25144267082214355},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2429264783859253},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.21107423305511475},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1740506887435913}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6899463534355164},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6851347088813782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6758863925933838},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6331622004508972},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5822381973266602},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5233346819877625},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.5171029567718506},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5152259469032288},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.42718666791915894},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4124550521373749},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.32618653774261475},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.30084002017974854},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.25144267082214355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2429264783859253},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21107423305511475},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1740506887435913}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/prisms.2014.6970599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prisms.2014.6970599","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W86845558","https://openalex.org/W1559839702","https://openalex.org/W1746848557","https://openalex.org/W2011850408","https://openalex.org/W2027096953","https://openalex.org/W2079030232","https://openalex.org/W2158447652","https://openalex.org/W2644662048","https://openalex.org/W6633562852"],"related_works":["https://openalex.org/W4239325954","https://openalex.org/W4309584611","https://openalex.org/W2744406407","https://openalex.org/W4232607684","https://openalex.org/W4308784203","https://openalex.org/W3118757263","https://openalex.org/W2182509353","https://openalex.org/W2472698743","https://openalex.org/W4319430330","https://openalex.org/W4242207981"],"abstract_inverted_index":{"The":[0],"high":[1],"usability":[2],"of":[3,37,50,77,101,120,146,159,166,204,210],"smartphones":[4],"and":[5,16,125,163,183,208],"tablets":[6],"is":[7,116,189,199],"embraced":[8],"by":[9],"consumers":[10],"as":[11,13,66],"well":[12],"the":[14,22,25,33,38,42,54,71,78,86,99,107,110,140,157,160,164,205],"corporate":[15],"public":[17],"sector.":[18],"However,":[19,104],"especially":[20],"in":[21,89,98,136,143,191],"non-consumer":[23],"area":[24],"factor":[26],"security":[27,51,65,80],"plays":[28],"a":[29,47,67,117,144,171,197],"decisive":[30],"role":[31],"for":[32,82],"platform-selection":[34],"process.":[35],"All":[36],"current":[39,102],"companies":[40],"within":[41,170,214],"mobile":[43,134],"device":[44,87,90],"sector":[45],"added":[46],"wide":[48,118],"range":[49,119],"features":[52,81],"to":[53,129,186],"initially":[55],"consumer-oriented":[56],"devices":[57,135],"(Apple,":[58],"Google,":[59],"Microsoft),":[60],"or":[61,88],"have":[62],"dealt":[63],"with":[64],"core":[68],"feature":[69],"from":[70],"beginning":[72],"(RIM,":[73],"now":[74],"Blackerry).":[75],"One":[76],"key":[79],"protecting":[83],"data":[84],"on":[85,152,194],"backups":[91],"are":[92,96,112,181],"encryption":[93,168,179,212],"systems,":[94],"which":[95,201],"available":[97],"majority":[100],"devices.":[103],"even":[105],"under":[106],"assumption":[108],"that":[109,127],"systems":[111,169,180,213],"implemented":[113],"correctly,":[114],"there":[115],"parameters,":[121],"specific":[122],"use":[123],"cases,":[124],"weaknesses":[126],"need":[128],"be":[130],"considered":[131],"when":[132],"deploying":[133],"security-critical":[137,172,215],"environments.":[138],"As":[139],"second":[141],"part":[142,150],"series":[145],"papers":[147],"(the":[148],"first":[149],"was":[151],"iOS),":[153],"this":[154,175],"work":[155],"analyzes":[156],"deployment":[158,203],"Android":[161,206],"platform":[162,207],"usage":[165,209],"its":[167,211],"context.":[173],"For":[174],"purpose,":[176],"Android's":[177],"different":[178,187],"assessed":[182],"their":[184],"susceptibility":[185],"attacks":[188],"analyzed":[190],"detail.":[192],"Based":[193],"these":[195],"results":[196],"workflow":[198],"presented,":[200],"supports":[202],"application":[216],"scenarios.":[217]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
