A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices
Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. T...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2018/11/01, Vol.E101.D(11), pp.2612-2621 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Schreiben Sie den ersten Kommentar!