2018
DOI: 10.1587/transinf.2017icp0017
|View full text |Cite
|
Sign up to set email alerts
|

A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices

Abstract: Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. The requirements of human social activities make people move carrying confidential data and data breach always happens during the transportation. The Internet connectivity and cryptographic technology have made the u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 12 publications
0
0
0
Order By: Relevance