Return to Article Details Comparison of the security mechanisms of popular operating systems for mobile devices Download Download PDF