A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices
2018
IEICE transactions on information and systems
Yong JIN †a) , Masahiko TOMOISHI †b) , Members, Satoshi MATSUURA †c) , Nonmember, and Yoshiaki KITAGUCHI †d) , Member SUMMARY Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. The requirements of human social activities make people move carrying
doi:10.1587/transinf.2017icp0017
fatcat:mi2pnfup5jdvlcgne2dnafqn5m