A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices

Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. T...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Information and Systems 2018/11/01, Vol.E101.D(11), pp.2612-2621
Hauptverfasser: JIN, Yong, TOMOISHI, Masahiko, MATSUURA, Satoshi, KITAGUCHI, Yoshiaki
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!