Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments

Sang Ho Kim, Choon Seong Leem

Research output: Contribution to journalConference articlepeer-review

10 Citations (Scopus)

Abstract

Security has been more crucial issue as targets of attacker are wide ranges from personal information to various things in ubiquitous computing environments. Portable computing devices such as cellular phone, PDA, and smart phone in such conditions have been exposured under security threats, which cause attacker to exploit malicious code and modification of storied data. In this paper we present security threats and their countermeasures in technical, manageable, and physical aspect of mobile portable computing devices. We believe that this paper will contributes on initiating a research on security issues of mobile portable computing devices and provide users with guidance to keep their information safe in mobile communication environments.

Original languageEnglish
Pages (from-to)79-85
Number of pages7
JournalLecture Notes in Computer Science
Volume3483
Issue numberIV
DOIs
Publication statusPublished - 2005
EventInternational Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore
Duration: 2005 May 92005 May 12

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments'. Together they form a unique fingerprint.

Cite this