A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices.
Yong JinMasahiko TomoishiSatoshi MatsuuraYoshiaki KitaguchiPublished in: IEICE Trans. Inf. Syst. (2018)
Keyphrases
- file system
- mobile devices
- user authentication
- authentication mechanism
- unauthorized access
- authentication scheme
- authentication protocol
- identity management
- factor authentication
- data encryption
- security analysis
- security mechanisms
- password authentication
- security requirements
- key distribution
- mobile phone
- wifi
- mobile learning
- integrity verification
- smart phones
- location based services
- context aware
- secure manner
- global positioning system
- security services
- mobile users
- key management
- cloud storage
- mobile commerce
- mobile terminals
- mobile applications
- smart card
- key agreement
- naming conventions
- public key cryptography
- continuous media
- security issues
- mobile services
- secure communication
- storage devices
- flash memory
- rights management
- key agreement protocol
- scalable distributed
- remote server
- electronic payment
- security policies
- document repository
- private key
- storage systems