%PDF-1.4
%
1 0 obj
<>
endobj
2 0 obj
<>stream
2013-02-05T19:58:31Z
Word
2013-02-05T14:58:50-05:00
2013-02-05T14:58:50-05:00
Adobe Mac PDF Plug-in
application/pdf
Greg Buehler
Microsoft Word - 12-119r1.docx
uuid:6ae1e95b-63f8-c141-81cb-6467f00f5965
uuid:3a45582a-7f78-db4f-9bfa-193227e8ef06
endstream
endobj
3 0 obj
<>
endobj
5 0 obj
<>
endobj
6 0 obj
<>
endobj
7 0 obj
<>
endobj
8 0 obj
<>
endobj
24 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Type/Page>>
endobj
25 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Type/Page>>
endobj
26 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Type/Page>>
endobj
27 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Type/Page>>
endobj
28 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC]/XObject<>>>/Type/Page>>
endobj
29 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/Type/Page>>
endobj
30 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/Type/Page>>
endobj
31 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/Type/Page>>
endobj
32 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/Type/Page>>
endobj
55 0 obj
<>stream
BT
/CS0 cs 0 0 0 scn
/GS0 gs
/TT0 1 Tf
0.013 Tc -0.008 Tw 10.8 0 0 10.8 90.2339 746.253 Tm
[(OGC)1( )1(1)4(2)]TJ
0 Tc 0 Tw 3.424 0 Td
(-)Tj
0.009 Tc -0.009 Tw 0.339 0 Td
[(119r)3(1)]TJ
/TT1 1 Tf
0 Tc 0 Tw ( )Tj
ET
q
86.634 45.213 125.04 35.04 re
W n
BT
/TT0 1 Tf
12 0 0 12 90.2339 47.613 Tm
(18)Tj
( )Tj
ET
Q
q
211.674 45.213 315.12 35.04 re
W n
BT
/TT0 1 Tf
0.008 Tc -0.004 Tw 9.84 0 0 9.84 328.4692 47.613 Tm
[(C)-3(opyr)2(i)4(ght)4( \251)-4( 2013 O)-4(pe)1(n G)-4(e)1(os)1(pa)1(t)3(i)3(a)1(l)4( C)-3(ons)1(or)2(t)3(i)3(um)-5(.)]TJ
0 Tc 0 Tw 19.797 0 Td
( )Tj
ET
Q
q
9.354 33.987 593.292 724.026 re
W n
BT
/TT0 1 Tf
12 0 0 12 90.2339 36.573 Tm
( )Tj
ET
Q
BT
/TT1 1 Tf
0.003 Tc -0.003 Tw 13.92 0 0 13.92 90.2339 694.893 Tm
[(B)-1(i)1(bl)1(i)1(ography)]TJ
0 Tc 0 Tw ( )Tj
/TT2 1 Tf
12 0 0 12 90.2339 643.053 Tm
([Burns 2008])Tj
( )Tj
8.271 0 Td
[(Burns, J. \(2008\) Developing Secure Mobile A)-1(pplications for )]TJ
0 -1.16 TD
[(A)-1(ndroid. A)-1(n introduction to make secure A)-1(nd)]TJ
(roid applications. isec )Tj
0 -1.14 TD
(partners. Online accessed on Oct. 2, 2012 at: )Tj
0 -1.16 TD
[(http:/)5(/)5(isecpartners.com/)5(files/)5(isec_)-2(securing_)-2(android_)-2(apps.pdf)]TJ
24.317 0 Td
( )Tj
ET
189.594 599.853 291.84 0.24 re
f
BT
/TT2 1 Tf
12 0 0 12 90.2339 575.613 Tm
([Templeman 2009])Tj
( )Tj
8.271 0 Td
(Templeman, R., Rahman, Z., Cran)Tj
[(dall, D., Kapadia, A)-1(. \(2012\) )]TJ
T*
[(PlaceRaider: V)-1(irtual Theft in Physical Spaces with Smartphones)]TJ
25.801 0 Td
(.)Tj
( )Tj
-25.801 -1.14 Td
(Online accessed on Oct. 3, 2012 at: )Tj
0 0 1 scn
T*
[(http:/)5(/)5(arxiv.org/)5(pdf/)5(1209.5982v1.pdf)]TJ
0 0 0 scn
14.732 0 Td
( )Tj
ET
0 0 1 scn
189.594 532.413 176.88 0.24 re
f
BT
0 0 0 scn
/TT2 1 Tf
12 0 0 12 90.2339 508.173 Tm
( )Tj
1 0 0 scn
0 -2.16 TD
( )Tj
0 0.502 0 scn
/TT0 1 Tf
0 -2.18 TD
( )Tj
0 0 0 scn
0 -2.16 TD
( )Tj
0 -2.14 TD
( )Tj
0 -2.16 TD
( )Tj
0 -2.14 TD
( )Tj
0 -2.16 TD
( )Tj
0 -2.14 TD
( )Tj
15.417 0 Td
( )Tj
ET
endstream
endobj
36 0 obj
<>
endobj
37 0 obj
<>
endobj
56 0 obj
<>
endobj
59 0 obj
<>
endobj
60 0 obj
<>stream
HW}PT? vYe/}'E\q-jtIH
a$:մiL)mI'FJ%_ISkuFؤfдFnf:;s}tyr7u:)ZSwSN"qΕ1pm8YX(h֖P?#̈́SI+1t[;.t_DA_Z?ts]17
SkZ>`0hO2M--[z8jQ+~&JD"&]wH%3Y(M[~4Af#;ʤ,948&S.Q>MP!9Eh2"*)4=TB E4C˪~vr
XAhGgU ~6NTC"
>b]o#4^bs)LTNl&g 3 [ Drh&e=_گ^M8a\lN]fD*}J7*C+:ڈ7f.02VN;Hw8VA;=jN'fadGlu@U[2wn꧟jQ%%,LSS)Okn}Ak:X u>fGy`MzQL 3!A }/ː$Od2`b[_}S-NĀ[V>J-}}[tgwa&ff6``N'"j!,I%7T6G_^RWOz;/!,jfpJ~:@4BQ6u*g?cGq9!D?)!S&29Eq]S+-Ѧhs;puէPC@ Lk6"
ZsW 5z@'O4;w<$6-,a~bld7GA;NӐKSMeY &xxD RBEN ¿LK J<./
fC^bXn6>oB`p`䵷z$%R=7e\N\
pVhNՎA*ǫd}MFדp\Ni+$W)> riikrܼ5AmϯZKb=m___μn[Txnu%\
jԠA-o
)cU"{5K]R*50ӝCB
]q93 e55[g8콱bt#1iZT&=eZRF2 0T٦$ ӱK1e)|pPOﴄciS8ow"?n'g1wayv<
efNsR9,UK8p1WLF9m;ukLGB- =] #pr:}(W