[1]
A.A.E. Ahmed and I. Traore: IEEE T DEPEND SECURE. Vol. 4(3) (2007), p.16.
Google Scholar
[2]
F. Bergadano, D. Guneti and C. Picardi: ACM T INFORM SYST SE Vol. 5(4) (2002), p.367.
Google Scholar
[3]
R. Bolle, J.H. Connell and N.K. Ratha: Pattern Recognition. Vol. 35 (2002), p.2727.
Google Scholar
[4]
M. Conti, I.Z. Zlatea and B. Crispo: Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (2011) March 22–24; New York, USA.
Google Scholar
[5]
M.O. Derawi, P. Bours and K. Holien: The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (2010) Oct. 15-17; Darmstadt, Germany.
DOI: 10.1109/iihmsp.2010.84
Google Scholar
[6]
M.N. Doja and N. Kumar: INFOCOMP Journal of Computer Science. Vol. 7(4) (2008), p.38.
Google Scholar
[7]
S. Furnell, N. Clarke and S. Karatzouni: Computer Fraud & Security. Vol. 2008(8) (2008), p.12.
Google Scholar
[8]
D. Gafurov, K. Helkala and T. Søndrol: Journal of Computers. Vol. 1 (2006), p.51.
Google Scholar
[9]
Information on http: /www. gartner. com/it/page. jsp?id=995812.
Google Scholar
[10]
Information on http: /www. gartner. com/it/page. jsp? id=1230413.
Google Scholar
[11]
Information on http: /www. slideshare. net/scapecast/accenture-mobility-mwc-2012-bubble- over-barcelona-lars-kamp.
Google Scholar
[12]
A. Kholmatov and B. Yanikoglu: Pattern Recognition Letters. Vol. 26(15) (2005), p.2400.
Google Scholar
[13]
D. Maio, D. Maltoni, R. Capelli, J.L. Wayman and A.K. Jain: IEEE T PATTERN ANAL. Vol. 24(3) (2002), p.402.
Google Scholar
[14]
O. Mazhelis, J. Markuula and J. Veijalainen: Info. Manage. & Comp. Secur. Vol. 13(5) (2005), p.367.
Google Scholar
[15]
Information on http: /www. medtrng. com/posturesdirection. htm.
Google Scholar
[16]
R. Meier, in: Professional Android™ 2 Application Development (Wiley Publishing Inc., 2010).
Google Scholar
[17]
D.M. Monro, S. Rakshit and D. Zhang: IEEE T PATTERN ANAL. Vol. 29(4) (2007), p.586.
Google Scholar
[18]
L. O'Gorman: Proceedings of the IEEE, Vol. 91(12) (2003), p. (2021).
Google Scholar
[19]
K. Revett, H. Jahankhani, S. Magalhães and H. Santos: Communications in Computer and Information Science (Global E-Security). Vol. 12 (2008), p.210.
Google Scholar
[20]
W. Shi, J. Yang, Y. Jiang, F. Yang and Y. Xiong: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), (2011) October 10-12; Shanghai, China.
DOI: 10.1109/wimob.2011.6085412
Google Scholar
[21]
Information on http: /www. smartcredit. com/blog/2011/09/02/consumer-reports-survey-on- Mobile-phones-and- security.
Google Scholar
[22]
Y. Sun: IEEE T PATTERN ANAL. Vol. 29 (2007), p.1035.
Google Scholar
[23]
Information on http: /nakedsecurity. sophos. com/2011/08/09/free-sophos-mobile-security- toolkit.
Google Scholar
[24]
Information on http: /www. vistalab. com/commoninjuries. asp.
Google Scholar
[25]
X. Wu, K. Wang and D. Zhang: Proceedings of 2006 International Conference on Computational Intelligence and Security, (2006) November 3-6; Guangzhou, China.
Google Scholar
[26]
Y.L. Zhang, J. Yang and H.T. Wu: Electronics Letters. Vol. 42(4) (2006), p.204.
Google Scholar